Interoperability in the Planetary Science Archive (PSA)
NASA Astrophysics Data System (ADS)
Rios Diaz, C.
2017-09-01
The protocols and standards currently being supported by the recently released new version of the Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet- Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. We explore these protocols in more detail providing scientifically useful examples of their usage within the PSA.
NASA Astrophysics Data System (ADS)
Civera Lorenzo, Tamara
2017-10-01
Brief presentation about the J-PLUS EDR data access web portal (http://archive.cefca.es/catalogues/jplus-edr) where the different services available to retrieve images and catalogues data have been presented.J-PLUS Early Data Release (EDR) archive includes two types of data: images and dual and single catalogue data which include parameters measured from images. J-PLUS web portal offers catalogue data and images through several different online data access tools or services each suited to a particular need. The different services offered are: Coverage map Sky navigator Object visualization Image search Cone search Object list search Virtual observatory services: Simple Cone Search Simple Image Access Protocol Simple Spectral Access Protocol Table Access Protocol
In-memory interconnect protocol configuration registers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheng, Kevin Y.; Roberts, David A.
Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less
Universal Network Access System
2003-11-01
128 Figure 37 The detail of the SCM TX , (LO; local oscillator, LPF; Low-pass filter, AMP; Amplifier, BPF ...with UNAS, ( BPF : band-pass filter, BM Rx; Burst Mode receiver, AWGR; Arrayed waveguide grating router, FBG; Fiber Bragg Grating, TL; Tunable Laser...protocols. Standard specifications and RFCs will be used as guidelines for implementation. Table 1 UNAS Serial I/O Formats Protocol Implement1
The NOAO Data Lab PHAT Photometry Database
NASA Astrophysics Data System (ADS)
Olsen, Knut; Williams, Ben; Fitzpatrick, Michael; PHAT Team
2018-01-01
We present a database containing both the combined photometric object catalog and the single epoch measurements from the Panchromatic Hubble Andromeda Treasury (PHAT). This database is hosted by the NOAO Data Lab (http://datalab.noao.edu), and as such exposes a number of data services to the PHAT photometry, including access through a Table Access Protocol (TAP) service, direct PostgreSQL queries, web-based and programmatic query interfaces, remote storage space for personal database tables and files, and a JupyterHub-based Notebook analysis environment, as well as image access through a Simple Image Access (SIA) service. We show how the Data Lab database and Jupyter Notebook environment allow for straightforward and efficient analyses of PHAT catalog data, including maps of object density, depth, and color, extraction of light curves of variable objects, and proper motion exploration.
TAPRegExt: a VOResource Schema Extension for Describing TAP Services Version 1.0
NASA Astrophysics Data System (ADS)
Demleitner, Markus; Dowler, Patrick; Plante, Ray; Rixon, Guy; Taylor, Mark; Demleitner, Markus
2012-08-01
This document describes an XML encoding standard for metadata about services implementing the table access protocol TAP [TAP], referred to as TAPRegExt. Instance documents are part of the service's registry record or can be obtained from the service itself. They deliver information to both humans and software on the languages, output formats, and upload methods supported by the service, as well as data models implemented by the exposed tables, optional language features, and certain limits enforced by the service.
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations
NASA Astrophysics Data System (ADS)
Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin
2011-12-01
The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.
Physical Accessibility of Routine Prenatal Care for Women with Mobility Disability
Wint, Amy J.; Smeltzer, Suzanne C.; Ecker, Jeffrey L.
2015-01-01
Abstract Background: Routine prenatal care includes physical examinations and weight measurement. Little is known about whether access barriers to medical diagnostic equipment, such as examination tables and weight scales, affect prenatal care among pregnant women with physical disabilities. Methods: We conducted 2-hour, in-depth telephone interviews with 22 women using a semistructured, open-ended interview protocol. All women had significant mobility difficulties before pregnancy and had delivered babies within the prior 10 years. We recruited most participants through social networks. We sorted interview transcript texts using used NVivo software and conducted conventional content analyses to identify major themes. Results: Interviewee's mean (standard deviation) age was 34.8 (5.3) years. Most were white, well-educated, and higher income; 8 women had spinal cord injuries, 4 cerebral palsy, and 10 had other conditions; 18 used wheeled mobility aids. Some women's obstetricians had height adjustable examination tables, which facilitated transfers for physical examinations. Other women had difficulty transferring onto fixed height examination tables and were examined while sitting in their wheelchairs. Family members and/or clinical staff sometimes assisted with transfers; some women reported concerns about transfer safety. No women reported being routinely weighed on an accessible weight scale by their prenatal care clinicians. A few were never weighed during their pregnancies. Conclusions: Inaccessible examination tables and weight scales impede some pregnant women with physical disabilities from getting routine prenatal physical examinations and weight measurement. This represents substandard care. Adjustable height examination tables and wheelchair accessible weight scales could significantly improve care and comfort for pregnant women with physical disabilities. PMID:26484689
Physical Accessibility of Routine Prenatal Care for Women with Mobility Disability.
Iezzoni, Lisa I; Wint, Amy J; Smeltzer, Suzanne C; Ecker, Jeffrey L
2015-12-01
Routine prenatal care includes physical examinations and weight measurement. Little is known about whether access barriers to medical diagnostic equipment, such as examination tables and weight scales, affect prenatal care among pregnant women with physical disabilities. We conducted 2-hour, in-depth telephone interviews with 22 women using a semistructured, open-ended interview protocol. All women had significant mobility difficulties before pregnancy and had delivered babies within the prior 10 years. We recruited most participants through social networks. We sorted interview transcript texts using used NVivo software and conducted conventional content analyses to identify major themes. Interviewee's mean (standard deviation) age was 34.8 (5.3) years. Most were white, well-educated, and higher income; 8 women had spinal cord injuries, 4 cerebral palsy, and 10 had other conditions; 18 used wheeled mobility aids. Some women's obstetricians had height adjustable examination tables, which facilitated transfers for physical examinations. Other women had difficulty transferring onto fixed height examination tables and were examined while sitting in their wheelchairs. Family members and/or clinical staff sometimes assisted with transfers; some women reported concerns about transfer safety. No women reported being routinely weighed on an accessible weight scale by their prenatal care clinicians. A few were never weighed during their pregnancies. Inaccessible examination tables and weight scales impede some pregnant women with physical disabilities from getting routine prenatal physical examinations and weight measurement. This represents substandard care. Adjustable height examination tables and wheelchair accessible weight scales could significantly improve care and comfort for pregnant women with physical disabilities.
32 CFR Appendix A to Part 179 - Tables of the Munitions Response Site Prioritization Protocol
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Tables of the Munitions Response Site... OF DEFENSE CLOSURES AND REALIGNMENT MUNITIONS RESPONSE SITE PRIORITIZATION PROTOCOL (MRSPP) Pt. 179, App. A Appendix A to Part 179—Tables of the Munitions Response Site Prioritization Protocol The tables...
32 CFR Appendix A to Part 179 - Tables of the Munitions Response Site Prioritization Protocol
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Tables of the Munitions Response Site... OF DEFENSE CLOSURES AND REALIGNMENT MUNITIONS RESPONSE SITE PRIORITIZATION PROTOCOL (MRSPP) Pt. 179, App. A Appendix A to Part 179—Tables of the Munitions Response Site Prioritization Protocol The tables...
32 CFR Appendix A to Part 179 - Tables of the Munitions Response Site Prioritization Protocol
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Tables of the Munitions Response Site... OF DEFENSE CLOSURES AND REALIGNMENT MUNITIONS RESPONSE SITE PRIORITIZATION PROTOCOL (MRSPP) Pt. 179, App. A Appendix A to Part 179—Tables of the Munitions Response Site Prioritization Protocol The tables...
32 CFR Appendix A to Part 179 - Tables of the Munitions Response Site Prioritization Protocol
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Tables of the Munitions Response Site... OF DEFENSE CLOSURES AND REALIGNMENT MUNITIONS RESPONSE SITE PRIORITIZATION PROTOCOL (MRSPP) Pt. 179, App. A Appendix A to Part 179—Tables of the Munitions Response Site Prioritization Protocol The tables...
32 CFR Appendix A to Part 179 - Tables of the Munitions Response Site Prioritization Protocol
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Tables of the Munitions Response Site... OF DEFENSE CLOSURES AND REALIGNMENT MUNITIONS RESPONSE SITE PRIORITIZATION PROTOCOL (MRSPP) Pt. 179, App. A Appendix A to Part 179—Tables of the Munitions Response Site Prioritization Protocol The tables...
Observation Data Model Core Components, its Implementation in the Table Access Protocol Version 1.1
NASA Astrophysics Data System (ADS)
Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel; Michel, Laurent; Bonnarel, Francos; Micol, Alberto; IVOA DataModel Working Group; Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel
2017-05-01
This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for astronomical observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery without having to understand the details of the services present at each site. It defines a minimal set of basic metadata and thus allows for a reasonable cost of implementation by data providers. The combination of the ObsCoreDM with TAP is referred to as an ObsTAP service. As with most of the VO Data Models, ObsCoreDM makes use of STC, Utypes, Units and UCDs. The ObsCoreDM can be serialized as a VOTable. ObsCoreDM can make reference to more complete data models such as Characterisation DM, Spectrum DM or Simple Spectral Line Data Model (SSLDM). ObsCore shares a large set of common concepts with DataSet Metadata Data Model (Cresitello-Dittmar et al. 2016) which binds together most of the data model concepts from the above models in a comprehensive and more general frame work. This current specification on the contrary provides guidelines for implementing these concepts using the TAP protocol and answering ADQL queries. It is dedicated to global discovery.
NASA Astrophysics Data System (ADS)
Macfarlane, A. J.; Docasal, R.; Rios, C.; Barbarisi, I.; Saiz, J.; Vallejo, F.; Besse, S.; Arviset, C.; Barthelemy, M.; De Marchi, G.; Fraga, D.; Grotheer, E.; Heather, D.; Lim, T.; Martinez, S.; Vallat, C.
2018-01-01
The Planetary Science Archive (PSA) is the European Space Agency's (ESA) repository of science data from all planetary science and exploration missions. The PSA provides access to scientific data sets through various interfaces at http://psa.esa.int. Mostly driven by the evolution of the PDS standards which all new ESA planetary missions shall follow and the need to update the interfaces to the archive, the PSA has undergone an important re-engineering. In order to maximise the scientific exploitation of ESA's planetary data holdings, significant improvements have been made by utilising the latest technologies and implementing widely recognised open standards. To facilitate users in handling and visualising the many products stored in the archive which have spatial data associated, the new PSA supports Geographical Information Systems (GIS) by implementing the standards approved by the Open Geospatial Consortium (OGC). The modernised PSA also attempts to increase interoperability with the international community by implementing recognised planetary science specific protocols such as the PDAP (Planetary Data Access Protocol) and EPN-TAP (EuroPlanet-Table Access Protocol). In this paper we describe some of the methods by which the archive may be accessed and present the challenges that are being faced in consolidating data sets of the older PDS3 version of the standards with the new PDS4 deliveries into a single data model mapping to ensure transparent access to the data for users and services whilst maintaining a high performance.
PrOtocols for WatERmarking (POWER)
2011-03-01
22. Page 57 of 94 Figure 22: Exemplary watermark structure incl. the structure of the embedded ToC The segmented watermarking approach for...somewhere within the cover. The addresses addressSLji belonging to the different access levels Li are stored in a table of contents ( ToC ) entry, along...then embedded into the ToC -segment Stoc. Several assumptions have to be made before describing the actual functions of the presented system
Schacht Hansen, M; Dørup, J
2001-01-01
The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.
Hansen, Michael Schacht
2001-01-01
Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946
Generation of comprehensive thoracic oncology database--tool for translational research.
Surati, Mosmi; Robinson, Matthew; Nandi, Suvobroto; Faoro, Leonardo; Demchuk, Carley; Kanteti, Rajani; Ferguson, Benjamin; Gangadhar, Tara; Hensing, Thomas; Hasina, Rifat; Husain, Aliya; Ferguson, Mark; Karrison, Theodore; Salgia, Ravi
2011-01-22
The Thoracic Oncology Program Database Project was created to serve as a comprehensive, verified, and accessible repository for well-annotated cancer specimens and clinical data to be available to researchers within the Thoracic Oncology Research Program. This database also captures a large volume of genomic and proteomic data obtained from various tumor tissue studies. A team of clinical and basic science researchers, a biostatistician, and a bioinformatics expert was convened to design the database. Variables of interest were clearly defined and their descriptions were written within a standard operating manual to ensure consistency of data annotation. Using a protocol for prospective tissue banking and another protocol for retrospective banking, tumor and normal tissue samples from patients consented to these protocols were collected. Clinical information such as demographics, cancer characterization, and treatment plans for these patients were abstracted and entered into an Access database. Proteomic and genomic data have been included in the database and have been linked to clinical information for patients described within the database. The data from each table were linked using the relationships function in Microsoft Access to allow the database manager to connect clinical and laboratory information during a query. The queried data can then be exported for statistical analysis and hypothesis generation.
2016-06-01
unlimited. v List of Tables Table 1 Single-lap-joint experimental parameters ..............................................7 Table 2 Survey ...Joints: Experimental and Workflow Protocols by Robert E Jensen, Daniel C DeSchepper, and David P Flanagan Approved for...TR-7696 ● JUNE 2016 US Army Research Laboratory Multivariate Analysis of High Through-Put Adhesively Bonded Single Lap Joints: Experimental
Europlanet/IDIS: Combining Diverse Planetary Observations and Models
NASA Astrophysics Data System (ADS)
Schmidt, Walter; Capria, Maria Teresa; Chanteur, Gerard
2013-04-01
Planetary research involves a diversity of research fields from astrophysics and plasma physics to atmospheric physics, climatology, spectroscopy and surface imaging. Data from all these disciplines are collected from various space-borne platforms or telescopes, supported by modelling teams and laboratory work. In order to interpret one set of data often supporting data from different disciplines and other missions are needed while the scientist does not always have the detailed expertise to access and utilize these observations. The Integrated and Distributed Information System (IDIS) [1], developed in the framework of the Europlanet-RI project, implements a Virtual Observatory approach ([2] and [3]), where different data sets, stored in archives around the world and in different formats, are accessed, re-formatted and combined to meet the user's requirements without the need of familiarizing oneself with the different technical details. While observational astrophysical data from different observatories could already earlier be accessed via Virtual Observatories, this concept is now extended to diverse planetary data and related model data sets, spectral data bases etc. A dedicated XML-based Europlanet Data Model (EPN-DM) [4] was developed based on data models from the planetary science community and the Virtual Observatory approach. A dedicated editor simplifies the registration of new resources. As the EPN-DM is a super-set of existing data models existing archives as well as new spectroscopic or chemical data bases for the interpretation of atmospheric or surface observations, or even modeling facilities at research institutes in Europe or Russia can be easily integrated and accessed via a Table Access Protocol (EPN-TAP) [5] adapted from the corresponding protocol of the International Virtual Observatory Alliance [6] (IVOA-TAP). EPN-TAP allows to search catalogues, retrieve data and make them available through standard IVOA tools if the access to the archive is compatible with IVOA standards. For some major data archives with different standards adaptation tools are available to make the access transparent to the user. EuroPlaNet-IDIS has contributed to the definition of PDAP, the Planetary Data Access Protocol of the International Planetary Data Alliance (IPDA) [7] to access the major planetary data archives of NASA in the USA [8], ESA in Europe [9] and JAXA in Japan [10]. Acknowledgement: Europlanet-RI was funded by the European Commission under the 7th Framework Program, grant 228319 "Capacities Specific Programme" - Research Infrastructures Action. Reference: [1] Details to IDIS and the Europlanet-RI via Web-site: http://www.idis.europlanet-ri.eu/ [2] Demonstrator implementation for Plasma-VO AMDA: http://cdpp-amda.cesr.fr/DDHTML/index.html [3] Demonstrator implementation for the IDIS-VO: http://www.idis-dyn.europlanet-ri.eu/vodev.shtml [4] Europlanet Data Model EPN-DM: http://www.europlanet-idis.fi/documents/public_documents/EPN-DM-v2.0.pdf [5] Europlanet Table Access Protocol EPN-TAP: http://www.europlanet-idis.fi/documents/public_documents/EPN-TAPV_0.26.pdf [6] International Virtual Observatory Alliance IVOA: http://www.ivoa.net [7] International Planetary Data Alliance IPDA: http://planetarydata.org/ [8] NASA's Planetary Data System: http://pds.jpl.nasa.gov/ [9] ESA's Planetary Science Archive PSA: http://www.sciops.esa.int/index.php?project=PSA [10] JAXAs Data Archive and Transmission System DARTS: http://darts.isas.jaxa.jp/
Interoperability In The New Planetary Science Archive (PSA)
NASA Astrophysics Data System (ADS)
Rios, C.; Barbarisi, I.; Docasal, R.; Macfarlane, A. J.; Gonzalez, J.; Arviset, C.; Grotheer, E.; Besse, S.; Martinez, S.; Heather, D.; De Marchi, G.; Lim, T.; Fraga, D.; Barthelemy, M.
2015-12-01
As the world becomes increasingly interconnected, there is a greater need to provide interoperability with software and applications that are commonly being used globally. For this purpose, the development of the new Planetary Science Archive (PSA), by the European Space Astronomy Centre (ESAC) Science Data Centre (ESDC), is focused on building a modern science archive that takes into account internationally recognised standards in order to provide access to the archive through tools from third parties, for example by the NASA Planetary Data System (PDS), the VESPA project from the Virtual Observatory of Paris as well as other international institutions. The protocols and standards currently being supported by the new Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet-Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. The architecture of the PSA consists of a Geoserver (an open-source map server), the goal of which is to support use cases such as the distribution of search results, sharing and processing data through a OGC Web Feature Service (WFS) and a Web Map Service (WMS). This server also allows the retrieval of requested information in several standard output formats like Keyhole Markup Language (KML), Geography Markup Language (GML), shapefile, JavaScript Object Notation (JSON) and Comma Separated Values (CSV), among others. The provision of these various output formats enables end-users to be able to transfer retrieved data into popular applications such as Google Mars and NASA World Wind.
NASA Astrophysics Data System (ADS)
Wang, Jianhua; Cheng, Lianglun; Wang, Tao; Peng, Xiaodong
2016-03-01
Table look-up operation plays a very important role during the decoding processing of context-based adaptive variable length decoding (CAVLD) in H.264/advanced video coding (AVC). However, frequent table look-up operation can result in big table memory access, and then lead to high table power consumption. Aiming to solve the problem of big table memory access of current methods, and then reduce high power consumption, a memory-efficient table look-up optimized algorithm is presented for CAVLD. The contribution of this paper lies that index search technology is introduced to reduce big memory access for table look-up, and then reduce high table power consumption. Specifically, in our schemes, we use index search technology to reduce memory access by reducing the searching and matching operations for code_word on the basis of taking advantage of the internal relationship among length of zero in code_prefix, value of code_suffix and code_lengh, thus saving the power consumption of table look-up. The experimental results show that our proposed table look-up algorithm based on index search can lower about 60% memory access consumption compared with table look-up by sequential search scheme, and then save much power consumption for CAVLD in H.264/AVC.
Vipie: web pipeline for parallel characterization of viral populations from multiple NGS samples.
Lin, Jake; Kramna, Lenka; Autio, Reija; Hyöty, Heikki; Nykter, Matti; Cinek, Ondrej
2017-05-15
Next generation sequencing (NGS) technology allows laboratories to investigate virome composition in clinical and environmental samples in a culture-independent way. There is a need for bioinformatic tools capable of parallel processing of virome sequencing data by exactly identical methods: this is especially important in studies of multifactorial diseases, or in parallel comparison of laboratory protocols. We have developed a web-based application allowing direct upload of sequences from multiple virome samples using custom parameters. The samples are then processed in parallel using an identical protocol, and can be easily reanalyzed. The pipeline performs de-novo assembly, taxonomic classification of viruses as well as sample analyses based on user-defined grouping categories. Tables of virus abundance are produced from cross-validation by remapping the sequencing reads to a union of all observed reference viruses. In addition, read sets and reports are created after processing unmapped reads against known human and bacterial ribosome references. Secured interactive results are dynamically plotted with population and diversity charts, clustered heatmaps and a sortable and searchable abundance table. The Vipie web application is a unique tool for multi-sample metagenomic analysis of viral data, producing searchable hits tables, interactive population maps, alpha diversity measures and clustered heatmaps that are grouped in applicable custom sample categories. Known references such as human genome and bacterial ribosomal genes are optionally removed from unmapped ('dark matter') reads. Secured results are accessible and shareable on modern browsers. Vipie is a freely available web-based tool whose code is open source.
A proposed protocol for hand and table sanitizing in chiropractic clinics and education institutions
Evans, Marion Willard; Ramcharan, Michael; Floyd, Rod; Globe, Gary; Ndetan, Harrison; Williams, Ronald; Ivie, Ronald
2009-01-01
Abstract Objective By nature, chiropractic is a hands-on profession using manipulation applied to the joints with direct skin-to-skin contacts. Chiropractic tables are designed with a face piece to accommodate the prone patient's head in a neutral position and hand rests to allow for relaxed shoulders and upper spine so treatment is facilitated. The purpose of this article is to present a proposed guideline for hand and treatment table surface sanitizing for the chiropractic profession that is evidence-based and can easily be adopted by teaching institutions and doctors in the field. Methods A review of the chiropractic literature demonstrated that pathogenic microbes are present on treatment tables in teaching clinics at multiple facilities, yet no standardized protocols exist in the United States regarding table sanitizing and hand hygiene in chiropractic clinics or education institutions. This article reviews the scientific literature on the subject by using several search engines, databases, and specific reviews of documents pertaining to the topic including existing general guidelines. Results The literature has several existing guidelines that the authors used to develop a proposed protocol for hand and table sanitizing specific to the chiropractic profession. Recommendations were developed and are presented on hand hygiene and table sanitizing procedures that could lower the risk of infection for both clinical personnel and patients in chiropractic facilities. Conclusion This article offers a protocol for hand and table sanitizing in chiropractic clinics and education institutions. The chiropractic profession should consider adoption of these or similar measures and disseminate them to teaching clinics, institutions, and private practitioners. PMID:19646384
Telidon Videotex presentation level protocol: Augmented picture description instructions
NASA Astrophysics Data System (ADS)
Obrien, C. D.; Brown, H. G.; Smirle, J. C.; Lum, Y. F.; Kukulka, J. Z.; Kwan, A.
1982-02-01
The Telidon Videotex system is a method by which graphic and textual information and transactional services can be accessed from information sources by the general public. In order to transmit information to a Telidon terminal at a minimum bandwidth, and in a manner independent of the type of communications channel, a coding scheme was devised which permits the encoding of a picture into the geometric drawing elements which compose it. These picture description instructions are an alpha geometric coding model and are based on the primitives of POINT, LINE, ARC, RECTANGLE, POLYGON, and INCREMENT. Text is encoded as (ASCII) characters along with a supplementary table of accents and special characters. A mosaic shape table is included for compatibility. A detailed specification of the coding scheme and a description of the principles which make it independent of communications channel and display hardware are provided.
NASA Astrophysics Data System (ADS)
Han, Yishi; Luo, Zhixiao; Wang, Jianhua; Min, Zhixuan; Qin, Xinyu; Sun, Yunlong
2014-09-01
In general, context-based adaptive variable length coding (CAVLC) decoding in H.264/AVC standard requires frequent access to the unstructured variable length coding tables (VLCTs) and significant memory accesses are consumed. Heavy memory accesses will cause high power consumption and time delays, which are serious problems for applications in portable multimedia devices. We propose a method for high-efficiency CAVLC decoding by using a program instead of all the VLCTs. The decoded codeword from VLCTs can be obtained without any table look-up and memory access. The experimental results show that the proposed algorithm achieves 100% memory access saving and 40% decoding time saving without degrading video quality. Additionally, the proposed algorithm shows a better performance compared with conventional CAVLC decoding, such as table look-up by sequential search, table look-up by binary search, Moon's method, and Kim's method.
Al-Khalifah, Nasser S; Shanavaskhan, A E
2017-01-01
Ambiguity in the total number of date palm cultivars across the world is pointing toward the necessity for an enumerative study using standard morphological and molecular markers. Among molecular markers, DNA markers are more suitable and ubiquitous to most applications. They are highly polymorphic in nature, frequently occurring in genomes, easy to access, and highly reproducible. Various molecular markers such as restriction fragment length polymorphism (RFLP), amplified fragment length polymorphism (AFLP), simple sequence repeats (SSR), inter-simple sequence repeats (ISSR), and random amplified polymorphic DNA (RAPD) markers have been successfully used as efficient tools for analysis of genetic variation in date palm. This chapter explains a stepwise protocol for extracting total genomic DNA from date palm leaves. A user-friendly protocol for RAPD analysis and a table showing the primers used in different molecular techniques that produce polymorphisms in date palm are also provided.
Verification and validation of a reliable multicast protocol
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.
1995-01-01
This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.
ERIC Educational Resources Information Center
Nazemi, Azadeh; Murray, Iain; Fernaando, Chandrika; McMeekin, David A.
2016-01-01
Documents use tables to communicate multidimensional information clearly, summarise and present data in an easy-to-interpret way. Tabular information in scanned PDF due to its nature without further processing is not accessible for vision-impaired people who use assistive technology such as screen readers. The lack of access to table contents…
Data-Dictionary-Editing Program
NASA Technical Reports Server (NTRS)
Cumming, A. P.
1989-01-01
Access to data-dictionary relations and attributes made more convenient. Data Dictionary Editor (DDE) application program provides more convenient read/write access to data-dictionary table ("descriptions table") via data screen using SMARTQUERY function keys. Provides three main advantages: (1) User works with table names and field names rather than with table numbers and field numbers, (2) Provides online access to definitions of data-dictionary keys, and (3) Provides displayed summary list that shows, for each datum, which data-dictionary entries currently exist for any specific relation or attribute. Computer program developed to give developers of data bases more convenient access to the OMNIBASE VAX/IDM data-dictionary relations and attributes.
Carrasco-Labra, Alonso; Brignardello-Petersen, Romina; Santesso, Nancy; Neumann, Ignacio; Mustafa, Reem A; Mbuagbaw, Lawrence; Ikobaltzeta, Itziar Etxeandia; De Stio, Catherine; McCullagh, Lauren J; Alonso-Coello, Pablo; Meerpohl, Joerg J; Vandvik, Per Olav; Brozek, Jan L; Akl, Elie A; Bossuyt, Patrick; Churchill, Rachel; Glenton, Claire; Rosenbaum, Sarah; Tugwell, Peter; Welch, Vivian; Guyatt, Gordon; Schünemann, Holger
2015-04-16
Systematic reviews represent one of the most important tools for knowledge translation but users often struggle with understanding and interpreting their results. GRADE Summary-of-Findings tables have been developed to display results of systematic reviews in a concise and transparent manner. The current format of the Summary-of-Findings tables for presenting risks and quality of evidence improves understanding and assists users with finding key information from the systematic review. However, it has been suggested that additional methods to present risks and display results in the Summary-of-Findings tables are needed. We will conduct a non-inferiority parallel-armed randomized controlled trial to determine whether an alternative format to present risks and display Summary-of-Findings tables is not inferior compared to the current standard format. We will measure participant understanding, accessibility of the information, satisfaction, and preference for both formats. We will invite systematic review users to participate (that is clinicians, guideline developers, and researchers). The data collection process will be undertaken using the online 'Survey Monkey' system. For the primary outcome understanding, non-inferiority of the alternative format (Table A) to the current standard format (Table C) of Summary-of-Findings tables will be claimed if the upper limit of a 1-sided 95% confidence interval (for the difference of proportion of participants answering correctly a given question) excluded a difference in favor of the current format of more than 10%. This study represents an effort to provide systematic reviewers with additional options to display review results using Summary-of-Findings tables. In this way, review authors will have a variety of methods to present risks and more flexibility to choose the most appropriate table features to display (that is optional columns, risks expressions, complementary methods to display continuous outcomes, and so on). NCT02022631 (21 December 2013).
Precise definition of anonymization in genetic polymorphism studies.
Hamajima, Nobuyuki; Atsuta, Yoshiko; Niwa, Yoshimitsu; Nishio, Kazuko; Tanaka, Daisuke; Yamamoto, Kazuhito; Tamakoshi, Akiko
2004-01-01
Anonymization is an essential tool to protect privacy of participants in epidemiological studies. This paper classifies types of anonymization in genetic polymorphism studies, providing precise definitions. They are: 1) unlinkable anonymization at enrollment without a participant list; 2) unlinkable anonymization before genotyping with a participant list; 3) linkable anonymization; 4) unlinkable anonymization for outsiders; and 5) linkable anonymization for outsiders. The classification in view of accessibility to a table including genotype data with directly identifiable data such as names is important; if such tables exist, staff may obtain genotype information about participants. The first three modes are defined here as anonymization unaccessible to genotype data with directly identifiable information for research staff. Anonymization with a key code held by participants is possible with any of the above anonymization modes, by which participants can access to their own genotypes through telephone or internet. A guideline issued on March 29, 2001 with collaboration of three Ministries in Japan defines "anonymization in a linkable fashion" and "anonymization in an unlinkable fashion", "for the purpose of preventing the personal information from being divulged externally in violation of law, the present guidelines or a research protocol", but the contents are not clear in practice. The proposed definitions will be useful when we describe and discuss the preferable mode of anonymization for a given polymorphism study.
Toward fidelity between specification and implementation
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.; Morrison, Jeff; Wu, Yunqing
1994-01-01
This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
Interoperability at ESA Heliophysics Science Archives: IVOA, HAPI and other implementations
NASA Astrophysics Data System (ADS)
Martinez-Garcia, B.; Cook, J. P.; Perez, H.; Fernandez, M.; De Teodoro, P.; Osuna, P.; Arnaud, M.; Arviset, C.
2017-12-01
The data of ESA heliophysics science missions are preserved at the ESAC Science Data Centre (ESDC). The ESDC aims for the long term preservation of those data, which includes missions such as Ulysses, Soho, Proba-2, Cluster, Double Star, and in the future, Solar Orbiter. Scientists have access to these data through web services, command line and graphical user interfaces for each of the corresponding science mission archives. The International Virtual Observatory Alliance (IVOA) provides technical standards that allow interoperability among different systems that implement them. By adopting some IVOA standards, the ESA heliophysics archives are able to share their data with those tools and services that are VO-compatible. Implementation of those standards can be found in the existing archives: Ulysses Final Archive (UFA) and Soho Science Archive (SSA). They already make use of VOTable format definition and Simple Application Messaging Protocol (SAMP). For re-engineered or new archives, the implementation of services through Table Access Protocol (TAP) or Universal Worker Service (UWS) will leverage this interoperability. This will be the case for the Proba-2 Science Archive (P2SA) and the Solar Orbiter Archive (SOAR). We present here which IVOA standards were already used by the ESA Heliophysics archives in the past and the work on-going.
Simple Tools to Facilitate Project Management of a Nursing Research Project.
Aycock, Dawn M; Clark, Patricia C; Thomas-Seaton, LaTeshia; Lee, Shih-Yu; Moloney, Margaret
2016-07-01
Highly organized project management facilitates rigorous study implementation. Research involves gathering large amounts of information that can be overwhelming when organizational strategies are not used. We describe a variety of project management and organizational tools used in different studies that may be particularly useful for novice researchers. The studies were a multisite study of caregivers of stroke survivors, an Internet-based diary study of women with migraines, and a pilot study testing a sleep intervention in mothers of low-birth-weight infants. Project management tools were used to facilitate enrollment, data collection, and access to results. The tools included protocol and eligibility checklists, event calendars, screening and enrollment logs, instrument scoring tables, and data summary sheets. These tools created efficiency, promoted a positive image, minimized errors, and provided researchers with a sense of control. For the studies described, there were no protocol violations, there were minimal missing data, and the integrity of data collection was maintained. © The Author(s) 2016.
ERMes: Open Source Simplicity for Your E-Resource Management
ERIC Educational Resources Information Center
Doering, William; Chilton, Galadriel
2009-01-01
ERMes, the latest version of electronic resource management system (ERM), is a relational database; content in different tables connects to, and works with, content in other tables. ERMes requires Access 2007 (Windows) or Access 2008 (Mac) to operate as the database utilizes functionality not available in previous versions of Microsoft Access. The…
Neck Cooling Improves Table Tennis Performance amongst Young National Level Players
Desai, Terun; Bottoms, Lindsay
2017-01-01
This study aimed to examine the effects of neck cooling on table tennis performance. Eight young, National level, male table tennis players (age 16 ± 2 years, height 1.77 ± 0.08 m, body mass 67.54 ± 10.66 kg) were recruited. Participants attended four testing sessions separated by a week. Session one determined fitness levels, and session two was a familiarisation trial. The final two sessions involved completing the table tennis-specific protocol either with (ICE) or without (CON) neck cooling for 1 min before each exercise period (bout: 80–90 shots), which represented an individual game. The exercise protocol required completing three bouts to represent a match, each simulating a different skill (forehand, backhand, alternate forehand and backhand), against a mechanical ball thrower. Performance was measured by the number of balls hitting two pre-determined targets. Heart rate, ratings of perceived exertion (RPE), and thermal sensation (TS) were measured. Total performance scores (shots on target) were significantly greater during ICE (136 ± 26), compared to CON (120 ± 25; p = 0.006) with a 15 (±12)% improvement. Effects for time (p < 0.05) but not condition (p > 0.05) were found for RPE and all other physiological variables. TS significantly decreased with cooling throughout the protocol (p = 0.03). Neck cooling appears to be beneficial for table tennis performance by lowering thermal sensation. PMID:29910379
Neck Muscle Fatigue Resulting from Prolonged Wear of Weighted Helmets
2008-06-01
23 LIST OF TABLES Table 1. Subject Anthropometry ...prior to any testing (Protocol F-WR-2005-0023-H). Table 1. Subject Anthropometry Males Females Group Range Mean SD Range Mean SD...Three sizes (M, L, XL ) of the HGU-55/P flight helmet were modified to simulate either a currently operational or “in-development” helmet mounted
2002-09-01
Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet
[The maximum heart rate in the exercise test: the 220-age formula or Sheffield's table?].
Mesquita, A; Trabulo, M; Mendes, M; Viana, J F; Seabra-Gomes, R
1996-02-01
To determine in the maximum cardiac rate in exercise test of apparently healthy individuals may be more properly estimated through 220-age formula (Astrand) or the Sheffield table. Retrospective analysis of clinical history and exercises test of apparently healthy individuals submitted to cardiac check-up. Sequential sampling of 170 healthy individuals submitted to cardiac check-up between April 1988 and September 1992. Comparison of maximum cardiac rate of individuals studied by the protocols of Bruce and modified Bruce, in interrupted exercise test by fatigue, and with the estimated values by the formulae: 220-age versus Sheffield table. The maximum cardiac heart rate is similar with both protocols. This parameter in normal individuals is better predicted by the 220-age formula. The theoretic maximum cardiac heart rate determined by 220-age formula should be recommended for a healthy, and for this reason the Sheffield table has been excluded from our clinical practice.
Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen
2012-12-27
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.
Virtual Observatory Interfaces to the Chandra Data Archive
NASA Astrophysics Data System (ADS)
Tibbetts, M.; Harbo, P.; Van Stone, D.; Zografou, P.
2014-05-01
The Chandra Data Archive (CDA) plays a central role in the operation of the Chandra X-ray Center (CXC) by providing access to Chandra data. Proprietary interfaces have been the backbone of the CDA throughout the Chandra mission. While these interfaces continue to provide the depth and breadth of mission specific access Chandra users expect, the CXC has been adding Virtual Observatory (VO) interfaces to the Chandra proposal catalog and observation catalog. VO interfaces provide standards-based access to Chandra data through simple positional queries or more complex queries using the Astronomical Data Query Language. Recent development at the CDA has generalized our existing VO services to create a suite of services that can be configured to provide VO interfaces to any dataset. This approach uses a thin web service layer for the individual VO interfaces, a middle-tier query component which is shared among the VO interfaces for parsing, scheduling, and executing queries, and existing web services for file and data access. The CXC VO services provide Simple Cone Search (SCS), Simple Image Access (SIA), and Table Access Protocol (TAP) implementations for both the Chandra proposal and observation catalogs within the existing archive architecture. Our work with the Chandra proposal and observation catalogs, as well as additional datasets beyond the CDA, illustrates how we can provide configurable VO services to extend core archive functionality.
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Table-driven software architecture for a stitching system
NASA Technical Reports Server (NTRS)
Thrash, Patrick J. (Inventor); Miller, Jeffrey L. (Inventor); Pallas, Ken (Inventor); Trank, Robert C. (Inventor); Fox, Rhoda (Inventor); Korte, Mike (Inventor); Codos, Richard (Inventor); Korolev, Alexandre (Inventor); Collan, William (Inventor)
2001-01-01
Native code for a CNC stitching machine is generated by generating a geometry model of a preform; generating tool paths from the geometry model, the tool paths including stitching instructions for making stitches; and generating additional instructions indicating thickness values. The thickness values are obtained from a lookup table. When the stitching machine runs the native code, it accesses a lookup table to determine a thread tension value corresponding to the thickness value. The stitching machine accesses another lookup table to determine a thread path geometry value corresponding to the thickness value.
NASA Astrophysics Data System (ADS)
Mohammad, Atif Farid; Straub, Jeremy
2015-05-01
A multi-craft asteroid survey has significant data synchronization needs. Limited communication speeds drive exacting performance requirements. Tables have been used in Relational Databases, which are structure; however, DOMBA (Distributed Objects Management Based Articulation) deals with data in terms of collections. With this, no read/write roadblocks to the data exist. A master/slave architecture is created by utilizing the Gossip protocol. This facilitates expanding a mission that makes an important discovery via the launch of another spacecraft. The Open Space Box Framework facilitates the foregoing while also providing a virtual caching layer to make sure that continuously accessed data is available in memory and that, upon closing the data file, recharging is applied to the data.
Interactive access to forest inventory data for the South Central United States
William H. McWilliams
1990-01-01
On-line access to USDA, Forest Service successive forest inventory data for the South Central United States is provided by two computer systems. The Easy Access to Forest Inventory and Analysis Tables program (EZTAB) produces a set of tables for specific geographic areas. The Interactive Graphics and Retrieval System (INGRES) is a database management system that...
2001-05-01
This appendix presents tables of some of the more common conversion factors for units of measure used throughout Current Protocols manuals, as well as prefixes indicating powers of ten for SI units. Another table gives conversions between temperatures on the Celsius (Centigrade) and Fahrenheit scales.
Volume and taper tables for red alder.
Robert O. Curtis; David Bruce; Caryanne VanCoevering
1968-01-01
Red alder is a species of increasing importance in the Pacific Northwest. Interest in improved volume tables for the species resulted in publication of the 1949 volume tables. More recently, Browne (1962) published cubic-foot-volume tables for red alder in British Columbia, and Hoyer (1966) presented tarif access tables, based on the 1949 tables, for use with the...
Analysis of underlying and multiple-cause mortality data: the life table methods.
Moussa, M A
1987-02-01
The stochastic compartment model concepts are employed to analyse and construct complete and abbreviated total mortality life tables, multiple-decrement life tables for a disease, under the underlying and pattern-of-failure definitions of mortality risk, cause-elimination life tables, cause-elimination effects on saved population through the gain in life expectancy as a consequence of eliminating the mortality risk, cause-delay life tables designed to translate the clinically observed increase in survival time as the population gain in life expectancy that would occur if a treatment protocol was made available to the general population and life tables for disease dependency in multiple-cause data.
2012-01-01
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Flexible Method for Inter-object Communication in C++
NASA Technical Reports Server (NTRS)
Curlett, Brian P.; Gould, Jack J.
1994-01-01
A method has been developed for organizing and sharing large amounts of information between objects in C++ code. This method uses a set of object classes to define variables and group them into tables. The variable tables presented here provide a convenient way of defining and cataloging data, as well as a user-friendly input/output system, a standardized set of access functions, mechanisms for ensuring data integrity, methods for interprocessor data transfer, and an interpretive language for programming relationships between parameters. The object-oriented nature of these variable tables enables the use of multiple data types, each with unique attributes and behavior. Because each variable provides its own access methods, redundant table lookup functions can be bypassed, thus decreasing access times while maintaining data integrity. In addition, a method for automatic reference counting was developed to manage memory safely.
The VO-Dance web application at the IA2 data center
NASA Astrophysics Data System (ADS)
Molinaro, Marco; Knapic, Cristina; Smareglia, Riccardo
2012-09-01
Italian center for Astronomical Archives (IA2, http://ia2.oats.inaf.it) is a national infrastructure project of the Italian National Institute for Astrophysics (Istituto Nazionale di AstroFisica, INAF) that provides services for the astronomical community. Besides data hosting for the Large Binocular Telescope (LBT) Corporation, the Galileo National Telescope (Telescopio Nazionale Galileo, TNG) Consortium and other telescopes and instruments, IA2 offers proprietary and public data access through user portals (both developed and mirrored) and deploys resources complying the Virtual Observatory (VO) standards. Archiving systems and web interfaces are developed to be extremely flexible about adding new instruments from other telescopes. VO resources publishing, along with data access portals, implements the International Virtual Observatory Alliance (IVOA) protocols providing astronomers with new ways of analyzing data. Given the large variety of data flavours and IVOA standards, the need for tools to easily accomplish data ingestion and data publishing arises. This paper describes the VO-Dance tool, that IA2 started developing to address VO resources publishing in a dynamical way from already existent database tables or views. The tool consists in a Java web application, potentially DBMS and platform independent, that stores internally the services' metadata and information, exposes restful endpoints to accept VO queries for these services and dynamically translates calls to these endpoints to SQL queries coherent with the published table or view. In response to the call VO-Dance translates back the database answer in a VO compliant way.
NEOview: Near Earth Object Data Discovery and Query
NASA Astrophysics Data System (ADS)
Tibbetts, M.; Elvis, M.; Galache, J. L.; Harbo, P.; McDowell, J. C.; Rudenko, M.; Van Stone, D.; Zografou, P.
2013-10-01
Missions to Near Earth Objects (NEOs) figure prominently in NASA's Flexible Path approach to human space exploration. NEOs offer insight into both the origins of the Solar System and of life, as well as a source of materials for future missions. With NEOview scientists can locate NEO datasets, explore metadata provided by the archives, and query or combine disparate NEO datasets in the search for NEO candidates for exploration. NEOview is a software system that illustrates how standards-based interfaces facilitate NEO data discovery and research. NEOview software follows a client-server architecture. The server is a configurable implementation of the International Virtual Observatory Alliance (IVOA) Table Access Protocol (TAP), a general interface for tabular data access, that can be deployed as a front end to existing NEO datasets. The TAP client, seleste, is a graphical interface that provides intuitive means of discovering NEO providers, exploring dataset metadata to identify fields of interest, and constructing queries to retrieve or combine data. It features a powerful, graphical query builder capable of easing the user's introduction to table searches. Through science use cases, NEOview demonstrates how potential targets for NEO rendezvous could be identified by combining data from complementary sources. Through deployment and operations, it has been shown that the software components are data independent and configurable to many different data servers. As such, NEOview's TAP server and seleste TAP client can be used to create a seamless environment for data discovery and exploration for tabular data in any astronomical archive.
Mashup of Geo and Space Science Data Provided via Relational Databases in the Semantic Web
NASA Astrophysics Data System (ADS)
Ritschel, B.; Seelus, C.; Neher, G.; Iyemori, T.; Koyama, Y.; Yatagai, A. I.; Murayama, Y.; King, T. A.; Hughes, J. S.; Fung, S. F.; Galkin, I. A.; Hapgood, M. A.; Belehaki, A.
2014-12-01
The use of RDBMS for the storage and management of geo and space science data and/or metadata is very common. Although the information stored in tables is based on a data model and therefore well organized and structured, a direct mashup with RDF based data stored in triple stores is not possible. One solution of the problem consists in the transformation of the whole content into RDF structures and storage in triple stores. Another interesting way is the use of a specific system/service, such as e.g. D2RQ, for the access to relational database content as virtual, read only RDF graphs. The Semantic Web based -proof of concept- GFZ ISDC uses the triple store Virtuoso for the storage of general context information/metadata to geo and space science satellite and ground station data. There is information about projects, platforms, instruments, persons, product types, etc. available but no detailed metadata about the data granuals itself. Such important information, as e.g. start or end time or the detailed spatial coverage of a single measurement is stored in RDBMS tables of the ISDC catalog system only. In order to provide a seamless access to all available information about the granuals/data products a mashup of the different data resources (triple store and RDBMS) is necessary. This paper describes the use of D2RQ for a Semantic Web/SPARQL based mashup of relational databases used for ISDC data server but also for the access to IUGONET and/or ESPAS and further geo and space science data resources. RDBMS Relational Database Management System RDF Resource Description Framework SPARQL SPARQL Protocol And RDF Query Language D2RQ Accessing Relational Databases as Virtual RDF Graphs GFZ ISDC German Research Centre for Geosciences Information System and Data Center IUGONET Inter-university Upper Atmosphere Global Observation Network (Japanese project) ESPAS Near earth space data infrastructure for e-science (European Union funded project)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Winslow, J; Hurwitz, L; Christianson, O
2014-06-01
Purpose: In CT scanners, the automatic exposure control (AEC) tube current prescription depends on the acquired prescan localizer image(s). The purpose of this study was to quantify the effect that table height, patient size, and localizer acquisition order may have on the reproducibility in prescribed dose. Methods: Three phantoms were used for this study: the Mercury Phantom (comprises three tapered and four uniform regions of polyethylene 16, 23, 30, and 37 cm in diameter), acrylic sheets, and an adult anthropomorphic phantom. Phantoms were positioned per clinical protocol by our chief CT technologist or broader symmetry. Using a GE Discovery CT750HDmore » scanner, a lateral (LAT) and posterior-anterior (PA) localizer was acquired for each phantom at different table heights. AEC scan acquisitions were prescribed for each combination of phantom, localizer orientation, and table height; the displayed volume CTDI was recorded for each. Results were analyzed versus table height. Results: For the two largest Mercury Phantom section scans based on the PA localizer, the percent change in volume CTDI from ideal were at least 20% lower and 35% greater for table heights 4 cm above and 4 cm below proper centering, respectively. For scans based on the LAT localizer, the percent change in volume CTDI from ideal were no greater than 12% different for 4 cm differences in table height. The properly centered PA and LAT localizer-based volume CTDI values were within 13% of each other. Conclusion: Since uncertainty in vertical patient positioning is inherently greater than lateral positioning and because the variability in dose exceeds any dose penalties incurred, the LAT localizer should be used to precisely and reproducibly deliver the intended amount of radiation prescribed by CT protocols. CT protocols can be adjusted to minimize the expected change in average patient dose.« less
A simple, effective media access protocol system for integrated, high data rate networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.
1992-01-01
The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
A New Compression Method for FITS Tables
NASA Technical Reports Server (NTRS)
Pence, William; Seaman, Rob; White, Richard L.
2010-01-01
As the size and number of FITS binary tables generated by astronomical observatories increases, so does the need for a more efficient compression method to reduce the amount disk space and network bandwidth required to archive and down1oad the data tables. We have developed a new compression method for FITS binary tables that is modeled after the FITS tiled-image compression compression convention that has been in use for the past decade. Tests of this new method on a sample of FITS binary tables from a variety of current missions show that on average this new compression technique saves about 50% more disk space than when simply compressing the whole FITS file with gzip. Other advantages of this method are (1) the compressed FITS table is itself a valid FITS table, (2) the FITS headers remain uncompressed, thus allowing rapid read and write access to the keyword values, and (3) in the common case where the FITS file contains multiple tables, each table is compressed separately and may be accessed without having to uncompress the whole file.
The Star Schema Benchmark and Augmented Fact Table Indexing
NASA Astrophysics Data System (ADS)
O'Neil, Patrick; O'Neil, Elizabeth; Chen, Xuedong; Revilak, Stephen
We provide a benchmark measuring star schema queries retrieving data from a fact table with Where clause column restrictions on dimension tables. Clustering is crucial to performance with modern disk technology, since retrievals with filter factors down to 0.0005 are now performed most efficiently by sequential table search rather than by indexed access. DB2’s Multi-Dimensional Clustering (MDC) provides methods to "dice" the fact table along a number of orthogonal "dimensions", but only when these dimensions are columns in the fact table. The diced cells cluster fact rows on several of these "dimensions" at once so queries restricting several such columns can access crucially localized data, with much faster query response. Unfortunately, columns of dimension tables of a star schema are not usually represented in the fact table. In this paper, we show a simple way to adjoin physical copies of dimension columns to the fact table, dicing data to effectively cluster query retrieval, and explain how such dicing can be achieved on database products other than DB2. We provide benchmark measurements to show successful use of this methodology on three commercial database products.
Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network
NASA Astrophysics Data System (ADS)
Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre
2006-10-01
Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).
75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-27
... respirators (500 and 1000 for protocols 1 and 2, respectively). However, OSHA could not evaluate the results... the values of these descriptive statistics for revised PortaCount[supreg] QNFT protocols 1 (at RFFs of 100 and 500) and 2 (at RFFs of 200 and 1000). Table 2--Descriptive Statistics for RFFs of 100 and 200...
Nett Warrior C3Conflict Experiment: Measuring the Effect of Battlefield Awareness in Small Units
2011-01-01
Top-level categories used to score the protocol of the soldiers’ text-based “chat” communications...17 Table 4. Subcategories for Pulls, Pushes, and Scripts used to score the protocol of the soldier’s chat
Ramírez-Iglesia, Lilido Nelson; Roman Bravo, Rafael María; Díaz de Ramirez, Adelina; Torres, Leandro J.
2014-01-01
The aim of this research was to compare two artificial insemination protocols (AIP): hormonal synchronization with fixed time artificial insemination (SC-FTAI) and the use of a table based on visual observation of estrus signs (VO) in order to identify cows in natural or spontaneous estrus being assigned to AI (NSE-IA). Two groups were formed: in the first group 109 cows were assigned to SC-FTAI, in which a commercial protocol is used; the second one included 108 randomly chosen cows, which were assigned to NSE-AI and in this group a modified table was used. Response variable was first service fertility rate (FSF), which was coded 1 for pregnant and 0 for empty. Predictor variables were AIP, postpartum anestrus, daily milk yield, body condition score at AI and calving number. Statistical analyses included association chi-square tests and logistic regression. Results showed an overall 41.94% FSF and a significant association was detected (P < 0.05) between FSF and daily milk yield; pregnancy rates were 42.20% and 41.67% for the SC-FTAI and NSE-IA groups, respectively (P > 0.05). The odds ratio for the effect of AIP was only 1.050, suggesting no differences in FSF between groups. The NSE-AI protocol can enhance both the technique of VO and reproductive efficiency. Further validation of the table is required. PMID:26464929
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... Connection testing [using current Nasdaq access protocols] during the normal operating hours of the NTF; No Charge--For Idle Connection testing [using current Nasdaq access protocols]; $333/hour--For Active Connection testing [using current Nasdaq access protocols] at all times other than the normal operating hours...
Generic Protocol for the Verification of Ballast Water Treatment Technology. Version 5.1
2010-09-01
the Protocol ..................................................................................... 2 1.4 Verification Testing Process ...Volumes, Containers and Processing .................................................................38 Table 10. Recommendation for Water...or persistent distortion of a measurement process that causes errors in one direction. Challenge Water: Water supplied to a treatment system under
Cloth-covered chiropractic treatment tables as a source of allergens and pathogenic microbes.
Evans, Marion W; Campbell, Alan; Husbands, Chris; Breshears, Jennell; Ndetan, Harrison; Rupert, Ronald
2008-03-01
Vinyl chiropractic tables have been found to harbor pathogenic bacteria, but wiping with a simple disinfection agent can significantly reduce the risk of bacteria. The aim of this study was to assess the presence of microbes and other allergens or pathogens on cloth chiropractic tables. Cloth-covered tables in a chiropractic college teaching clinic were selected. Samples were taken from the facial piece and hand rests with RODAC plates containing nutrient agar, followed by confirmatory testing when indicated. Numerous microbacteria strains were found, including Staphylococcus aureus and Propionibacterium. Allergen-producing molds, including Candida, were also found. Cloth tables were shown to contain pathogenic microbacteria and allergens. The chiropractic profession should establish an infection control protocol relevant to treatment tables and discard use of cloth-covered treatment tables in this process.
X-Ray Form Factor, Attenuation and Scattering Tables
National Institute of Standards and Technology Data Gateway
SRD 66 X-Ray Form Factor, Attenuation and Scattering Tables (Web, free access) This database collects tables and graphs of the form factors, the photoabsorption cross section, and the total attenuation coefficient for any element (Z <= 92).
FD/DAMA Scheme For Mobile/Satellite Communications
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.
1992-01-01
Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.
Reliable multicast protocol specifications protocol operations
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd; Whetten, Brian
1995-01-01
This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.
ERIC Educational Resources Information Center
Substance Abuse and Mental Health Services Administration (DHHS/PHS), Rockville, MD. Office of Applied Studies.
This document presents the technical appendices and selected data tables from the 2001 National Household Survey on Drug Abuse. Included are a description of the survey; statistical methods and limitations of the data; effects of changes in survey protocol on trend measurement; key definitions for the 1999-2001 survey years; and other sources of…
The Performance of Preparatory School Candidates at the United States Naval Academy
2001-09-01
79 1. Differences in Characteristics .....................................................79 2. Differences in...Coefficients ......................................42 Table 3.3 Applicant/Midshipman Background Characteristics ...45 Table 3.4 Descriptive Characteristics for Midshipmen by Accession Source .................46 Table 3.5 Descriptive Statistics for
Durand, Marie-Anne; Alam, Shama; Grande, Stuart W; Elwyn, Glyn
2016-01-01
Objective Women of low socioeconomic status (SES) diagnosed with early stage breast cancer experience decision-making, treatment and outcome disparities. Evidence suggests that decision aids can benefit underserved patients, when tailored to their needs. Our aim was to develop and test the usability, acceptability and accessibility of a pictorial encounter decision aid targeted at women of low SES diagnosed with early stage breast cancer. Design Community-based participatory research (CBPR) using think-aloud protocols (phases 1 and 2) and semistructured interviews (phase 3). Setting Underserved community settings (eg, knitting groups, bingo halls, senior centres) and breast clinics. Participants In phase 1, we recruited a convenience sample of clinicians and academics. In phase 2, we targeted women over 40 years of age, of low SES, regardless of breast cancer history, and in phase 3, women of low SES, recently diagnosed with breast cancer. Intervention The pictorial encounter decision aid was derived from an evidence-based table comparing treatment options for breast cancer (http://www.optiongrid.org). Outcome measures We assessed the usability, acceptability and accessibility of the pictorial decision aid prototypes using the think-aloud protocol and semistructured interviews. Results After initial testing of the first prototype with 18 academics and health professionals, new versions were developed and tested with 53 lay individuals in community settings. Usability was high. In response to feedback indicating that the use of cartoon characters was considered insensitive, a picture-only version was developed and tested with 23 lay people in phase 2, and 10 target users in phase 3. Conclusions and relevance Using CBPR methods and iterative user testing cycles improved usability and accessibility, and led to the development of the Picture Option Grid, entirely guided by multiple stakeholder feedback. All women of low SES recently diagnosed with early stage breast cancer found the Picture Option Grid usable, acceptable and accessible. PMID:26839014
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Non-Trawl Rockfish Conservation Areas and Trip Limits for Open Access Gears North of 40°10â² N. Lat. 3 Table 3 (North) to Part 660, Subpart F...) to Part 660, Subpart F—Non-Trawl Rockfish Conservation Areas and Trip Limits for Open Access Gears...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false 2010 Trip Limits for Open Access Gears North of 40°10â² N. Lat. 3 Table 3 (North) to Part 660, Subpart F Wildlife and Fisheries FISHERY... Limits for Open Access Gears North of 40°10′ N. Lat. ER01OC10.020 ER01OC10.021 ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false 2010 Trip Limits for Open Access Gears South of 40°10â² N. Lat. 3 Table 3 (South) to Part 660, Subpart F Wildlife and Fisheries FISHERY... Limits for Open Access Gears South of 40°10′ N. Lat. ER01OC10.022 ER01OC10.023 ...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Non-Trawl Rockfish Conservation Areas and Trip Limits for Open Access Gears South of 40°10â² N. Lat. 3 Table 3 (South) to Part 660, Subpart F...) to Part 660, Subpart F—Non-Trawl Rockfish Conservation Areas and Trip Limits for Open Access Gears...
On Ramps: Options and Issues in Accessing the Internet.
ERIC Educational Resources Information Center
Bocher, Bob
1995-01-01
Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…
Validity of Assessments of Youth Access to Tobacco: The Familiarity Effect
Landrine, Hope; Klonoff, Elizabeth A.
2003-01-01
Objectives. We examined the standard compliance protocol and its validity as a measure of youth access to tobacco. Methods. In Study 1, youth smokers reported buying cigarettes in stores where they are regular customers. In Study 2, youths attempted to purchase cigarettes by using the Standard Protocol, in which they appeared at stores once for cigarettes, and by using the Familiarity Protocol, in which they were rendered regular customers by purchasing nontobacco items 4 times and then requested cigarettes during their fifth visit. Results. Sales to youths aged 17 years in the Familiarity Protocol were significantly higher than sales to the same age group in the Standard Protocols (62.5% vs. 6%, respectively). Conclusions. The Standard Protocol does not match how youths obtain cigarettes. Access is low for stranger youths within compliance studies, but access is high for familiar youths outside of compliance studies. PMID:14600057
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
Cloth-covered chiropractic treatment tables as a source of allergens and pathogenic microbes☆
Evans, Marion W.; Campbell, Alan; Husbands, Chris; Breshears, Jennell; Ndetan, Harrison; Rupert, Ronald
2008-01-01
Abstract Objective Vinyl chiropractic tables have been found to harbor pathogenic bacteria, but wiping with a simple disinfection agent can significantly reduce the risk of bacteria. The aim of this study was to assess the presence of microbes and other allergens or pathogens on cloth chiropractic tables. Methods Cloth-covered tables in a chiropractic college teaching clinic were selected. Samples were taken from the facial piece and hand rests with RODAC plates containing nutrient agar, followed by confirmatory testing when indicated. Results Numerous microbacteria strains were found, including Staphylococcus aureus and Propionibacterium. Allergen-producing molds, including Candida, were also found. Conclusion Cloth tables were shown to contain pathogenic microbacteria and allergens. The chiropractic profession should establish an infection control protocol relevant to treatment tables and discard use of cloth-covered treatment tables in this process. PMID:19674718
Charging Toward an Even Brighter Future
2011-01-01
counterparts, but rather seeking to be treated with equal recognition in all aspects such as protocol , etiquette , housing, and evaluation reporting...grade as well as GS-12 or higher. When consid- ered with other regulations such as DA PAM 600-60 (A Guide to Protocol and Etiquette for Official...PAM 600-60 (A Guide to Protocol and Etiquette for Official Enter- tainment) contains a table which lists the precedence of civilian and military
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bejarano Buele, A; Sperling, N; Parsai, E
2016-06-15
Purpose: Cone-beam CTs (CBCT) obtained from On-Board Imaging Devices (OBI) are increasingly being used for dose calculation purposes in adaptive radiotherapy. Patient and target morphology are monitored and the treatment plan is updated using CBCT. Due to the difference in image acquisition parameters, dose calculated in a CBCT can differ from planned dose. We evaluate the difference between dose calculation in kV CBCT and simulation CT, and the effect of HU-density tables in dose discrepancies Methods: HU values for various materials were obtained using a Catphan 504 phantom for a simulator CT (CTSIM) and two different OBI systems using threemore » imaging protocols: Head, Thorax and Pelvis. HU-density tables were created in the TPS for each OBI image protocol. Treatment plans were made on each Catphan 504 dataset and on the head, thorax and pelvis sections of an anthropomorphic phantom, with and without the respective HU-density table. DVH information was compared among OBI systems and planning CT. Results: Dose calculations carried on the Catphan 504 CBCTs, with and without the respective CT-density table, had a maximum difference of −0.65% from the values on the planning CT. The use of the respective HU-density table decreased the percent differences from planned values by half in most of the protocols. For the anthropomorphic phantom datasets, the use of the correct HU-density table reduced differences by 0.89% on OBI1 and 0.59% on OBI2 for the head, 0.49% on OBI1 for the thorax, and 0.25% on OBI2 for the pelvis. Differences from planned values without HU-density correction ranged from 3.13% (OBI1, thorax) to 0.30% (OBI2, thorax). Conclusion: CT-density tables in the TPS yield acceptable differences when used in partly homogeneous medium. Further corrections are needed when the medium contains pronounced density differences for accurate CBCT calculation. Current difference range (1–3%) can be clinically acceptable.« less
Internet Access and Pricing: Sorting Out the Options.
ERIC Educational Resources Information Center
Fowler, Thomas B.
1997-01-01
Discusses Internet access and pricing options. Highlights include restructuring of the telecommunications industry; current methods of access; economics of high-speed access; the impact of cheap Internet access; long-term possibilities; and a table that provides a comparison of Internet access methods. (LRW)
2015-12-01
WAIVERS ..............................................................................................49 APPENDIX C. DESCRIPTIVE STATISTICS ... Statistics of Dependent Variables. .............................................23 Table 6. Summary Statistics of Academics Variables...24 Table 7. Summary Statistics of Application Variables ............................................25 Table 8
NASA Technical Reports Server (NTRS)
Ingels, Frank; Owens, John; Daniel, Steven
1989-01-01
The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.
Stopping-Power and Range Tables for Electrons, Protons, and Helium Ions
National Institute of Standards and Technology Data Gateway
SRD 124 NISStopping-Power and Range Tables for Electrons, Protons, and Helium Ions (Web, free access) The databases ESTAR, PSTAR, and ASTAR calculate stopping-power and range tables for electrons, protons, or helium ions. Stopping-power and range tables can be calculated for electrons in any user-specified material and for protons and helium ions in 74 materials.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
Experiences with http/WebDAV protocols for data access in high throughput computing
NASA Astrophysics Data System (ADS)
Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier
2011-12-01
In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.
78 FR 59475 - Architectural Barriers Act Accessibility Guidelines; Outdoor Developed Areas
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-26
... following outdoor constructed features provided at these facilities: Picnic tables, fire rings, grills... requirements for picnic tables, fire rings, grills, fireplaces, wood stoves, trash and recycling receptacles... have required 50 percent of picnic tables, fire rings, grills, and benches to comply with the...
ERIC Educational Resources Information Center
Banks, Alton J.; Holmes, Jon L.
1995-01-01
Describes the characteristics of the digitized version of The Periodic Table Videodisc. Provides details about the organization of information and access to the data via Macintosh and Windows computers. (DDR)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-12
... continuing on page 59501, in the first column, Table 208.2--PARKING SPACES is corrected to read as follows: Table 208.2--Parking Spaces Total number of parking spaces provided in Minimum number of required parking facility accessible parking spaces 1 to 25 1. 26 to 50 2. 51 to 75 3. 76 to 100 4. 101 to 150 5...
Statistical Requirements For Pass-Fail Testing Of Contraband Detection Systems
NASA Astrophysics Data System (ADS)
Gilliam, David M.
2011-06-01
Contraband detection systems for homeland security applications are typically tested for probability of detection (PD) and probability of false alarm (PFA) using pass-fail testing protocols. Test protocols usually require specified values for PD and PFA to be demonstrated at a specified level of statistical confidence CL. Based on a recent more theoretical treatment of this subject [1], this summary reviews the definition of CL and provides formulas and spreadsheet functions for constructing tables of general test requirements and for determining the minimum number of tests required. The formulas and tables in this article may be generally applied to many other applications of pass-fail testing, in addition to testing of contraband detection systems.
Sriram, Vinay K; Montgomery, Doug
2017-07-01
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ITAC Between the Amendment 80 and BSAI Trawl Limited Access Sectors (Except Yellowfin Sole) 33 Table 33... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OF THE EXCLUSIVE ECONOMIC ZONE OFF ALASKA Pt. 679, Table 33 Table 33 to Part 679— Annual Apportion of Amendment 80 Species ITAC Between the...
IPv6 Geolocation Using Latency Constraints
2014-03-01
CDF area regions for ONE2ONE . . . . . . . . . . . . . . . . . . . . 37 ix THIS PAGE INTENTIONALLY LEFT BLANK x List of Tables Table 2.1 Number of... List of Acronyms and Abbreviations Ark archipelago AS autonomous system ASN autonomous system number BGP Border Gateway Protocol CAIDA Cooperative...request registered information by the organization such as the organization’s phone number , administrator, or physical address [19]. The DNS is a
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
Statistical Requirements For Pass-Fail Testing Of Contraband Detection Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gilliam, David M.
2011-06-01
Contraband detection systems for homeland security applications are typically tested for probability of detection (PD) and probability of false alarm (PFA) using pass-fail testing protocols. Test protocols usually require specified values for PD and PFA to be demonstrated at a specified level of statistical confidence CL. Based on a recent more theoretical treatment of this subject [1], this summary reviews the definition of CL and provides formulas and spreadsheet functions for constructing tables of general test requirements and for determining the minimum number of tests required. The formulas and tables in this article may be generally applied to many othermore » applications of pass-fail testing, in addition to testing of contraband detection systems.« less
Code of Federal Regulations, 2014 CFR
2014-10-01
... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Non-Trawl Rockfish Conservation Areas and Trip Limits for Open Access Gears South of 40°10ⲠN. Lat. 3 Table 3 (South) to Part 660, Subpart F Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Non-Trawl Rockfish Conservation Areas and Trip Limits for Open Access Gears North of 40°10ⲠN. Lat. 3 Table 3 (North) to Part 660, Subpart F Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION...
Software Engineering Laboratory (SEL) database organization and user's guide, revision 2
NASA Technical Reports Server (NTRS)
Morusiewicz, Linda; Bristow, John
1992-01-01
The organization of the Software Engineering Laboratory (SEL) database is presented. Included are definitions and detailed descriptions of the database tables and views, the SEL data, and system support data. The mapping from the SEL and system support data to the base table is described. In addition, techniques for accessing the database through the Database Access Manager for the SEL (DAMSEL) system and via the ORACLE structured query language (SQL) are discussed.
Software Engineering Laboratory (SEL) database organization and user's guide
NASA Technical Reports Server (NTRS)
So, Maria; Heller, Gerard; Steinberg, Sandra; Spiegel, Douglas
1989-01-01
The organization of the Software Engineering Laboratory (SEL) database is presented. Included are definitions and detailed descriptions of the database tables and views, the SEL data, and system support data. The mapping from the SEL and system support data to the base tables is described. In addition, techniques for accessing the database, through the Database Access Manager for the SEL (DAMSEL) system and via the ORACLE structured query language (SQL), are discussed.
Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin
2018-01-11
The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.
Structural barriers in access to medical marijuana in the USA-a systematic review protocol.
Valencia, Celina I; Asaolu, Ibitola O; Ehiri, John E; Rosales, Cecilia
2017-08-07
There are 43 state medical marijuana programs in the USA, yet limited evidence is available on the demographic characteristics of the patient population accessing these programs. Moreover, insights into the social and structural barriers that inform patients' success in accessing medical marijuana are limited. A current gap in the scientific literature exists regarding generalizable data on the social, cultural, and structural mechanisms that hinder access to medical marijuana among qualifying patients. The goal of this systematic review, therefore, is to identify the aforementioned mechanisms that inform disparities in access to medical marijuana in the USA. This scoping review protocol outlines the proposed study design for the systematic review and evaluation of peer-reviewed scientific literature on structural barriers to medical marijuana access. The protocol follows the guidelines set forth by the Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) checklist. The overarching goal of this study is to rigorously evaluate the existing peer-reviewed data on access to medical marijuana in the USA. Income, ethnic background, stigma, and physician preferences have been posited as the primary structural barriers influencing medical marijuana patient population demographics in the USA. Identification of structural barriers to accessing medical marijuana provides a framework for future policies and programs. Evidence-based policies and programs for increasing medical marijuana access help minimize the disparity of access among qualifying patients.
Advanced teleprocessing systems
NASA Astrophysics Data System (ADS)
Kleinrock, L.; Gerla, M.
1982-09-01
This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false 2009-2010 Trip Limits for Open Access Gears South of 40°10ⲠN. Lat. 5 Table 5 (South) to Part 660, Subpart G Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES Pt....
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false 2009-2010 Trip Limits for Open Access Gears North of 40°10ⲠN. Lat. 5 Table 5 (North) to Part 660, Subpart G Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES Pt....
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... month.[the following charges: $285/hour--For Active Connection testing using current Exchange access... using current Exchange access protocols; $333/hour--For Active Connection testing using current Exchange... a fee of $285 per hour for active connection testing using current BX access protocols during the...
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
Lawlor, Debbie A; Peters, Tim J; Howe, Laura D; Noble, Sian M; Kipping, Ruth R; Jago, Russell
2013-07-24
The Active For Life Year 5 (AFLY5) randomised controlled trial protocol was published in this journal in 2011. It provided a summary analysis plan. This publication is an update of that protocol and provides a detailed analysis plan. This update provides a detailed analysis plan of the effectiveness and cost-effectiveness of the AFLY5 intervention. The plan includes details of how variables will be quality control checked and the criteria used to define derived variables. Details of four key analyses are provided: (a) effectiveness analysis 1 (the effect of the AFLY5 intervention on primary and secondary outcomes at the end of the school year in which the intervention is delivered); (b) mediation analyses (secondary analyses examining the extent to which any effects of the intervention are mediated via self-efficacy, parental support and knowledge, through which the intervention is theoretically believed to act); (c) effectiveness analysis 2 (the effect of the AFLY5 intervention on primary and secondary outcomes 12 months after the end of the intervention) and (d) cost effectiveness analysis (the cost-effectiveness of the AFLY5 intervention). The details include how the intention to treat and per-protocol analyses were defined and planned sensitivity analyses for dealing with missing data. A set of dummy tables are provided in Additional file 1. This detailed analysis plan was written prior to any analyst having access to any data and was approved by the AFLY5 Trial Steering Committee. Its publication will ensure that analyses are in accordance with an a priori plan related to the trial objectives and not driven by knowledge of the data. ISRCTN50133740.
Vandvik, Per Olav; Santesso, Nancy; Akl, Elie A; You, John; Mulla, Sohail; Spencer, Frederick A; Johnston, Bradley C; Brozek, Jan; Kreis, Julia; Brandt, Linn; Zhou, Qi; Schünemann, Holger J; Guyatt, Gordon
2012-07-01
To determine the effects of formatting alternatives in Grading of Recommendations Assessment, Development, and Evaluation (GRADE) evidence profiles on guideline panelists' preferences, comprehension, and accessibility. We randomized 116 antithrombotic therapy guideline panelists to review one of two table formats with four formatting alternatives. After answering relevant questions, panelists reviewed the other format and reported their preferences for specific formatting alternatives. Panelists (88 of 116 invited [76%]) preferred presentation of study event rates over no study event rates (median 1 [interquartile range (IQR) 1] on 1-7 scale), absolute risk differences over absolute risks (median 2 [IQR 3]), and additional information in table cells over footnotes (median 1 [IQR 2]). Panelists presented with time frame information in the tables, and not only in footnotes, were more likely to correctly answer questions regarding time frame (58% vs. 11%, P<0.0001), and those presented with risk differences and not absolute risks were more likely to correctly interpret confidence intervals for absolute effects (95% vs. 54%, P<0.0001). Information was considered easy to find, easy to comprehend, and helpful in making recommendations regardless of table format (median 6, IQR 0-1). Panelists found information in GRADE evidence profiles accessible. Correct comprehension of some key information was improved by providing additional information in table and presenting risk differences. Copyright © 2012 Elsevier Inc. All rights reserved.
National Surface Water Survey, western wilderness area lakes: environmental assessment. Draft
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1985-03-01
The US Environmental Protection Agency (EPA) is proposing to sample 498 lakes in federally designated wilderness areas and national parks during the western part of the National Surface Water Survey (NSW). The NSWS has been undertaken to provide high quality data for evaluating the nature and extent of acid deposition throughout the United States. Sampling protocols established for the national survey call for the use of helicopters to gain access to lakes for sampling. Helicopters have already been used in the eastern and midwestern parts of the survey. The US Forest Service (FS) and the National Park Service (NPS) willmore » have to decide which sampling plan for wilderness areas, if any, can be approved under the Wilderness Act of 1964. This Environmental Assessment (EA) has been prepared to evaluate the environmental consequences of alternative means of gaining access to wilderness areas to meet the objectives of the NSWS. Based on this evaluation, EPA has reviewed the possible sampling alternatives and reached a conclusion on the preferred alternative. This assessment is being provided to the FS and the NPS for their use in evaluating the alternatives, including EPA's preferred one. As a result of its evaluation, EPA believes that wilderness area lakes should be included in the survey and that the preferred means of access is using helicopters. 94 references, 14 figures, 18 tables.« less
Research on a Queue Scheduling Algorithm in Wireless Communications Network
NASA Astrophysics Data System (ADS)
Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai
This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-01-01
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-06-14
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Pollutants: Mercury Emissions From Mercury Cell Chlor-Alkali Plants Pt. 63, Subpt. IIIII, Table 1 Table 1 to... . . . 1. Cell rooms a. For new or modified cell rooms, construct each cell room interior using materials... mercury spills or accumulations, and are easy to clean. b. Limit access around and beneath mercury cells...
Making Data Flow Diagrams Accessible for Visually Impaired Students Using Excel Tables
ERIC Educational Resources Information Center
Sauter, Vicki L.
2015-01-01
This paper addresses the use of Excel tables to convey information to blind students that would otherwise be presented using graphical tools, such as Data Flow Diagrams. These tables can supplement diagrams in the classroom when introducing their use to understand the scope of a system and its main sub-processes, on exams when answering questions…
An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.
Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y
2017-10-01
We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.
Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.
Chhor, Chloe M; Mercado, Cecilia L
2017-02-01
The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.
Xrootd in dCache - design and experiences
NASA Astrophysics Data System (ADS)
Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas
2011-12-01
dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.
Speech Signal Processing Research. Appendices 1 thru 9
1975-12-01
is 2400 rpm for a maximum rotational latency of 25 ms and an average of 12.5 ms. The track to track access time is 12 ms, the average access time...in Table 1-3. Table 1-3. Capabilities and Limitations Description Characteristics Start-Up Time Operating Temperature Operating Humidity...Storage Conditions - - ■ ■ ■ -*****•******* ~40 seconds 0oC (320F) to +50oC (1220F) ambient 10% to 80% with no condensation Temperature =0oC(32oF) to
A splay tree-based approach for efficient resource location in P2P networks.
Zhou, Wei; Tan, Zilong; Yao, Shaowen; Wang, Shipu
2014-01-01
Resource location in structured P2P system has a critical influence on the system performance. Existing analytical studies of Chord protocol have shown some potential improvements in performance. In this paper a splay tree-based new Chord structure called SChord is proposed to improve the efficiency of locating resources. We consider a novel implementation of the Chord finger table (routing table) based on the splay tree. This approach extends the Chord finger table with additional routing entries. Adaptive routing algorithm is proposed for implementation, and it can be shown that hop count is significantly minimized without introducing any other protocol overheads. We analyze the hop count of the adaptive routing algorithm, as compared to Chord variants, and demonstrate sharp upper and lower bounds for both worst-case and average case settings. In addition, we theoretically analyze the hop reducing in SChord and derive the fact that SChord can significantly reduce the routing hops as compared to Chord. Several simulations are presented to evaluate the performance of the algorithm and support our analytical findings. The simulation results show the efficiency of SChord.
Design of the frame structure for a multiservice interactive system using ATM-PON
NASA Astrophysics Data System (ADS)
Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae
1998-10-01
The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.
Development and Validation of a Porcine (Sus scrofa) Sepsis Model
2018-03-01
last IACUC approval, have any methods been identified to reduce the number of live animals used in this protocol? None 10. PUBLICATIONS...SUMMARY: (Please provide, in "ABSTRACT" format, a summary of the protocol objectives, materials and methods , results - include tables/figures, and...Materials and methods : Animals were anesthetized and instrumented for cardiovascular monitoring. Lipopolysaccharide (LPS, a large molecule present on the
Documentary of MFENET, a national computer network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shuttleworth, B.O.
1977-06-01
The national Magnetic Fusion Energy Computer Network (MFENET) is a newly operational star network of geographically separated heterogeneous hosts and a communications subnetwork of PDP-11 processors. Host processors interfaced to the subnetwork currently include a CDC 7600 at the Central Computer Center (CCC) and several DECsystem-10's at User Service Centers (USC's). The network was funded by a U.S. government agency (ERDA) to provide in an economical manner the needed computational resources to magnetic confinement fusion researchers. Phase I operation of MFENET distributed the processing power of the CDC 7600 among the USC's through the provision of file transport between anymore » two hosts and remote job entry to the 7600. Extending the capabilities of Phase I, MFENET Phase II provided interactive terminal access to the CDC 7600 from the USC's. A file management system is maintained at the CCC for all network users. The history and development of MFENET are discussed, with emphasis on the protocols used to link the host computers and the USC software. Comparisons are made of MFENET versus ARPANET (Advanced Research Projects Agency Computer Network) and DECNET (Digital Distributed Network Architecture). DECNET and MFENET host-to host, host-to-CCP, and link protocols are discussed in detail. The USC--CCP interface is described briefly. 43 figures, 2 tables.« less
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
Redactions in protocols for drug trials: what industry sponsors concealed.
Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C
2018-04-01
Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.
36 CFR Appendix A to Part 1191 - Table Of Contents
Code of Federal Regulations, 2014 CFR
2014-07-01
... Protruding Objects 205 Operable Parts 206 Accessible Routes 207 Accessible Means of Egress 208 Parking Spaces..., Kitchenettes, and Sinks 213 Toilet Facilities and Bathing Facilities 214 Washing Machines and Clothes Dryers... F205 Operable Parts F206 Accessible Routes F207 Accessible Means of Egress F208 Parking Spaces F209...
TableViewer for Herschel Data Processing
NASA Astrophysics Data System (ADS)
Zhang, L.; Schulz, B.
2006-07-01
The TableViewer utility is a GUI tool written in Java to support interactive data processing and analysis for the Herschel Space Observatory (Pilbratt et al. 2001). The idea was inherited from a prototype written in IDL (Schulz et al. 2005). It allows to graphically view and analyze tabular data organized in columns with equal numbers of rows. It can be run either as a standalone application, where data access is restricted to FITS (FITS 1999) files only, or it can be run from the Quick Look Analysis(QLA) or Interactive Analysis(IA) command line, from where also objects are accessible. The graphic display is very versatile, allowing plots in either linear or log scales. Zooming, panning, and changing data columns is performed rapidly using a group of navigation buttons. Selecting and de-selecting of fields of data points controls the input to simple analysis tasks like building a statistics table, or generating power spectra. The binary data stored in a TableDataset^1, a Product or in FITS files can also be displayed as tabular data, where values in individual cells can be modified. TableViewer provides several processing utilities which, besides calculation of statistics either for all channels or for selected channels, and calculation of power spectra, allows to convert/repair datasets by changing the unit name of data columns, and by modifying data values in columns with a simple calculator tool. Interactively selected data can be separated out, and modified data sets can be saved to FITS files. The tool will be very helpful especially in the early phases of Herschel data analysis when a quick access to contents of data products is important. TableDataset and Product are Java classes defined in herschel.ia.dataset.
Processor register error correction management
Bose, Pradip; Cher, Chen-Yong; Gupta, Meeta S.
2016-12-27
Processor register protection management is disclosed. In embodiments, a method of processor register protection management can include determining a sensitive logical register for executable code generated by a compiler, generating an error-correction table identifying the sensitive logical register, and storing the error-correction table in a memory accessible by a processor. The processor can be configured to generate a duplicate register of the sensitive logical register identified by the error-correction table.
Van Biesen, Debbie; Mactavish, Jennifer J; Vanlandewijck, Yves C
2014-04-01
Technical skill proficiency among elite table tennis players with intellectual disabilities (ID) was investigated in this study using two approaches: an off-court simulation testing protocol and an on-court, standardized observational framework during game play. Participants included 24 players with ID (M age = 25 yr., SD = 6; M IQ = 61, SD = 9), the top 16 performers, 13 men and 11 women, at the International Federation for sport for para-athletes with an intellectual disability (Inas) World Championships. Self-reported table tennis training experience of the players was 13 +/- 5 yr. In the Simulation Testing condition, players were instructed to play five sets of basic and five sets of advanced skills, which were subsequently assessed by experts using a standardized and validated observational protocol. The same protocol was used to assess the same skills during Game Play. Ratings of overall technical proficiency were not significantly different between Simulation Testing and Game Play conditions. There was a strong positive correlation between technical proficiency measured during Game Play vs Simulation Testing for the variables flick, topspin forehand, and topspin backhand. No correlations were found for the variables contra, block, and push. Insight into this relationship is important for future development of classification systems for ID athletes in the Paralympic Games, because comparing competition observation with the athlete's potential shown during the classification session is essential information for classifiers to confirm the athlete's competition class.
NASA Astrophysics Data System (ADS)
Phillips, Zephaniah; Paik, Seung-Ho; Kim, Yoohwan; Kim, Byung-Jo; Choi, Youngwoon; Kim, Beop-Min
2017-02-01
In this work, we analyzed the clinical applicability of NIRS for use during Quantitative Autonomic Testing (QAT). QAT is a protocol consisting of deep breathing, Valsalva maneuver, and tilt table examination. It is used to diagnose a patient with disorders of the autonomic nervous system (ANS). Disorders of ANS includes orthostatic hyper/hypotension, vasovagal syncope, and postural orthostatic tachycardia syndrome. The results of QAT are typically analyzed with the use of blood pressure and heart rate data, however these metrics may be influenced by factors such as arrhythmia, making the data interpretation and diagnosis difficult for clinicians. We tested our custom built 108-channel NIRS probe on 26 elderly patients during the QAT protocol with various ANS disorders. We found that prefrontal cerebral oxygenation correlated well with blood pressure and heart rate changes for all three tasks, making it a clinically feasible tool for observing ANS functionality. During the Valsalva maneuver, we observed a longer delayed and lower amplitude response of cerebral oxygenation to the prefrontal area in orthostatic intolerant patients. During the tilt table examination, we saw a larger response in cerebral oxygenation and less equal transient cerebral oxygenation during tilt up and tilt down in tilt table examinations that were positive (unhealthy), compared to tilt table examinations that were negative (healthy). Overall, our study showcases NIRS as an enhanced tool for understanding ANS disorders.
Optimizing TLB entries for mixed page size storage in contiguous memory
Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Kriegel, Jon K.; Ohmacht, Martin; Steinmacher-Burow, Burkhard
2013-04-30
A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page.
2016-02-02
23 Descriptive Statistics for Enlisted Service Applicants and Accessions...33 Summary Statistics for Applicants and Accessions for Enlisted Service ..................................... 36 Applicants and...utilization among Soldiers screened using TAPAS. Section 2 of this report includes the descriptive statistics AMSARA compiles and publishes
NASA Astrophysics Data System (ADS)
Suzuki, Daisuke; Hanyu, Takahiro
2018-04-01
A magnetic-tunnel-junction (MTJ)-oriented nonvolatile lookup table (LUT) circuit, in which a low-power data-shift function is performed by minimizing the number of write operations in MTJ devices is proposed. The permutation of the configuration memory cell for read/write access is performed as opposed to conventional direct data shifting to minimize the number of write operations, which results in significant write energy savings in the data-shift function. Moreover, the hardware cost of the proposed LUT circuit is small since the selector is shared between read access and write access. In fact, the power consumption in the data-shift function and the transistor count are reduced by 82 and 52%, respectively, compared with those in a conventional static random-access memory-based implementation using a 90 nm CMOS technology.
Data publication and sharing using the SciDrive service
NASA Astrophysics Data System (ADS)
Mishin, Dmitry; Medvedev, D.; Szalay, A. S.; Plante, R. L.
2014-01-01
Despite the last years progress in scientific data storage, still remains the problem of public data storage and sharing system for relatively small scientific datasets. These are collections forming the “long tail” of power log datasets distribution. The aggregated size of the long tail data is comparable to the size of all data collections from large archives, and the value of data is significant. The SciDrive project's main goal is providing the scientific community with a place to reliably and freely store such data and provide access to it to broad scientific community. The primary target audience of the project is astoromy community, and it will be extended to other fields. We're aiming to create a simple way of publishing a dataset, which can be then shared with other people. Data owner controls the permissions to modify and access the data and can assign a group of users or open the access to everyone. The data contained in the dataset will be automaticaly recognized by a background process. Known data formats will be extracted according to the user's settings. Currently tabular data can be automatically extracted to the user's MyDB table where user can make SQL queries to the dataset and merge it with other public CasJobs resources. Other data formats can be processed using a set of plugins that upload the data or metadata to user-defined side services. The current implementation targets some of the data formats commonly used by the astronomy communities, including FITS, ASCII and Excel tables, TIFF images, and YT simulations data archives. Along with generic metadata, format-specific metadata is also processed. For example, basic information about celestial objects is extracted from FITS files and TIFF images, if present. A 100TB implementation has just been put into production at Johns Hopkins University. The system features public data storage REST service supporting VOSpace 2.0 and Dropbox protocols, HTML5 web portal, command-line client and Java standalone client to synchronize a local folder with the remote storage. We use VAO SSO (Single Sign On) service from NCSA for users authentication that provides free registration for everyone.
Rapone, B; Nardi, G M; DI Venere, D; Pettini, F; Grassi, F R; Corsalini, M
2016-01-01
This study was aimed at assessing the effectiveness and the importance of an oral hygiene (OH) protocol in patients undergoing radiation therapy and chemotherapy after prosthesis rehabilitation, in order to reduce or minimize oral complications. This study was carried out at the Department of Dental Science, at the University of Bari-Italy from December 2012 to December 2015 on 34 selected patients with primary oral cancer undergoing chemotherapy and radiotherapy after prosthesis rehabilitation. They were divided into 2 groups according to their age, sex and cancer therapy. Seventeen patients were assigned to the control group and seventeen in the experimental one. In the experimental group (Table 1), patients underwent an oral hygiene protocol whereas in the control group (Table 2) patients received the usual care provided within the clinical setting. All the patients gave written informed consent. It has been asked and obtained the authorisation from the Ethics Committee of the Dental Science and Surgery Department. Results show that in patients undergoing the oral hygiene protocol, the complications and the risks of infection and permanent dental problems have been minimized. Indeed, of the seventeen patients undergoing the OH protocol, 70% obtained positive results and were satisfied with the program outcome. The role of the health care providers is essential to educate patients to adhere to the prescribed treatments and reinforce their motivation in oral hygiene. The oral hygiene procedures prevent and ameliorate oral complications due to the radiation therapy and chemotherapy.
47 CFR 54.807 - Interstate access universal service support.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Common Carrier Bureau Report, Statistics of Communications Common Carriers, Table 6.10—Selected Operating Statistics. Interested parties may obtain this report from the U.S. Government Printing Office or by... Bureau Report, Statistics of Communications Common Carriers, Table 6.10—Selected Operating Statistics...
A universal data access and protocol integration mechanism for smart home
NASA Astrophysics Data System (ADS)
Shao, Pengfei; Yang, Qi; Zhang, Xuan
2013-03-01
With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.
Unaffiliated Users' Access to Academic Libraries: A Survey.
ERIC Educational Resources Information Center
Courtney, Nancy
2003-01-01
Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give borrowing privileges to certain categories of users. Use of library computers to access library resources and other computer applications is commonly allowed although authentication on library computers is increasing. Five tables show statistics.…
Population Representation in the Military Services, Fiscal Year 1991.
1992-10-01
Gender ) and B-5 (tispanic by Service and Gender ). There were significant race/ethnicity differences among the Services. The Army has long had the highest... women constituted only 25 percent of assigned strength. Both Table 25 and Table 26 reflect that gender differences still exist. Table 25 shows that...Accessions and Officer Corps by Gender and Service.) Women had higher representation among Active Component officers than among enlisted I personnel in FY
Cross-Layer Protocol Combining Tree Routing and TDMA Slotting in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Bai, Ronggang; Ji, Yusheng; Lin, Zhiting; Wang, Qinghua; Zhou, Xiaofang; Qu, Yugui; Zhao, Baohua
Being different from other networks, the load and direction of data traffic for wireless sensor networks are rather predictable. The relationships between nodes are cooperative rather than competitive. These features allow the design approach of a protocol stack to be able to use the cross-layer interactive way instead of a hierarchical structure. The proposed cross-layer protocol CLWSN optimizes the channel allocation in the MAC layer using the information from the routing tables, reduces the conflicting set, and improves the throughput. Simulations revealed that it outperforms SMAC and MINA in terms of delay and energy consumption.
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Research of Ad Hoc Networks Access Algorithm
NASA Astrophysics Data System (ADS)
Xiang, Ma
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.
NASA Astrophysics Data System (ADS)
Lahinta, A.; Haris, I.; Abdillah, T.
2017-03-01
The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.
Browsing for the Best Internet Access Provider?
ERIC Educational Resources Information Center
Weil, Marty
1996-01-01
Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…
Landmines on the Table: A Negotiations Analysis of the Global Campaign to Ban Landmines
2008-12-01
regard landmines as very cheap and effective weapons in defending troops and non-protected land against insurgents or attacking armies. The...weapons, including any which may be deemed to be excessively injurious or to have indiscriminate effects ‖ (UNGA, 1977). Resolution 32/152 paved the...Excessively Injurious or to Have Indiscriminate Effects ‖ (CCW) and its annexed Protocols, of which Protocol II dealt specifically with landmines. The US
2006-12-01
Robert N. Beck, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY...THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT...Warfighter Information Network – Tactical 1 I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT APPLIED PROJECT PLAN A. TENTATIVE PROJECT TITLE
Direct data access protocols benchmarking on DPM
NASA Astrophysics Data System (ADS)
Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina
2015-12-01
The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.
NASA Technical Reports Server (NTRS)
1984-01-01
The structure of the program, the five priority levels, the drive routines, the stepwise drive plan, the figure routines, meander X and y, the range of measurement table, the optimization of figure drive, the figure drive plan, dialogue routines, stack processing, the drive for the main terminal, the protocol routines, the drive for the microterminal, the drive for the experiment computer, and the main program are discussed.
Performance comparison of token ring protocols for hard-real-time communication
NASA Technical Reports Server (NTRS)
Kamat, Sanjay; Zhao, Wei
1992-01-01
The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Kusebauch, Ulrike; Deutsch, Eric W.; Campbell, David S.; Sun, Zhi; Farrah, Terry; Moritz, Robert L.
2014-01-01
PeptideAtlas, SRMAtlas and PASSEL are web-accessible resources to support discovery and targeted proteomics research. PeptideAtlas is a multi-species compendium of shotgun proteomic data provided by the scientific community, SRMAtlas is a resource of high-quality, complete proteome SRM assays generated in a consistent manner for the targeted identification and quantification of proteins, and PASSEL is a repository that compiles and represents selected reaction monitoring data, all in an easy to use interface. The databases are generated from native mass spectrometry data files that are analyzed in a standardized manner including statistical validation of the results. Each resource offers search functionalities and can be queried by user defined constraints; the query results are provided in tables or are graphically displayed. PeptideAtlas, SRMAtlas and PASSEL are publicly available freely via the website http://www.peptideatlas.org. In this protocol, we describe the use of these resources, we highlight how to submit, search, collate and download data. PMID:24939129
Evaluating the ergonomics of a student learning environment.
Rudolf, Michelle; Griffiths, Yolanda
2009-01-01
Ergonomics is a key consideration of a student-learning environment. This paper examines aspects of ergonomics and application to the design of tables in three classrooms at a Midwestern university. Custom tables with power outlets and Internet access via Ethernet data ports were planned for classrooms in 2000 to facilitate a laptop program. However, table height, specifically thigh clearance from the seat to the bottom of the work surface, was not fully considered. The ergonomic analysis of the classrooms by an occupational therapy student led to the implementation of positive changes to the tables. The enhancement of the learning environment influences student comfort and productivity and can offset the cost of renovating the tables.
The Chandra Source Catalog: User Interface
NASA Astrophysics Data System (ADS)
Bonaventura, Nina; Evans, I. N.; Harbo, P. N.; Rots, A. H.; Tibbetts, M. S.; Van Stone, D. W.; Zografou, P.; Anderson, C. S.; Chen, J. C.; Davis, J. E.; Doe, S. M.; Evans, J. D.; Fabbiano, G.; Galle, E.; Gibbs, D. G.; Glotfelty, K. J.; Grier, J. D.; Hain, R.; Hall, D. M.; He, X.; Houck, J. C.; Karovska, M.; Lauer, J.; McCollough, M. L.; McDowell, J. C.; Miller, J. B.; Mitschang, A. W.; Morgan, D. L.; Nichols, J. S.; Nowak, M. A.; Plummer, D. A.; Primini, F. A.; Refsdal, B. L.; Siemiginowska, A. L.; Sundheim, B. A.; Winkelman, S. L.
2009-01-01
The Chandra Source Catalog (CSC) is the definitive catalog of all X-ray sources detected by Chandra. The CSC is presented to the user in two tables: the Master Chandra Source Table and the Table of Individual Source Observations. Each distinct X-ray source identified in the CSC is represented by a single master source entry and one or more individual source entries. If a source is unaffected by confusion and pile-up in multiple observations, the individual source observations are merged to produce a master source. In each table, a row represents a source, and each column a quantity that is officially part of the catalog. The CSC contains positions and multi-band fluxes for the sources, as well as derived spatial, spectral, and temporal source properties. The CSC also includes associated source region and full-field data products for each source, including images, photon event lists, light curves, and spectra. The master source properties represent the best estimates of the properties of a source, and are presented in the following categories: Position and Position Errors, Source Flags, Source Extent and Errors, Source Fluxes, Source Significance, Spectral Properties, and Source Variability. The CSC Data Access GUI provides direct access to the source properties and data products contained in the catalog. The user may query the catalog database via a web-style search or an SQL command-line query. Each query returns a table of source properties, along with the option to browse and download associated data products. The GUI is designed to run in a web browser with Java version 1.5 or higher, and may be accessed via a link on the CSC website homepage (http://cxc.harvard.edu/csc/). As an alternative to the GUI, the contents of the CSC may be accessed directly through a URL, using the command-line tool, cURL. Support: NASA contract NAS8-03060 (CXC).
NASA Astrophysics Data System (ADS)
Jo, Hyunho; Sim, Donggyu
2014-06-01
We present a bitstream decoding processor for entropy decoding of variable length coding-based multiformat videos. Since most of the computational complexity of entropy decoders comes from bitstream accesses and table look-up process, the developed bitstream processing unit (BsPU) has several designated instructions to access bitstreams and to minimize branch operations in the table look-up process. In addition, the instruction for bitstream access has the capability to remove emulation prevention bytes (EPBs) of H.264/AVC without initial delay, repeated memory accesses, and additional buffer. Experimental results show that the proposed method for EPB removal achieves a speed-up of 1.23 times compared to the conventional EPB removal method. In addition, the BsPU achieves speed-ups of 5.6 and 3.5 times in entropy decoding of H.264/AVC and MPEG-4 Visual bitstreams, respectively, compared to an existing processor without designated instructions and a new table mapping algorithm. The BsPU is implemented on a Xilinx Virtex5 LX330 field-programmable gate array. The MPEG-4 Visual (ASP, Level 5) and H.264/AVC (Main Profile, Level 4) are processed using the developed BsPU with a core clock speed of under 250 MHz in real time.
Link, K H; Kornmann, M; Leder, G; Pillasch, A F; Sunelaitis, E; Schatz, M; Pressmar, J; Beger, H G
1999-02-01
Since the developments in systemic chemotherapy of metastasized colorectal cancer have not resulted in substantial gains in survival times, we wished to improve the course of isolated nonresectable colorectal liver metastases (CPLM) by hepatic arterial infusion treatment. Patients (pts) with CRLM have a worse fate than those pts whose liver metastases could be resected. Systemic (i.v.) chemotherapy for CRLM/colorectal metastases does not improve survival to a relevant level (median survival time (med. surv.) after 5-Fluorouracil + Folinic Acid (5-FU + FA) i.v.: 6.4-14.3 months (m)). Hepatic artery infusion (HAI) with 5-Fluorode-oxyuridine (5-FUDR) has been demonstrated in a metaanalysis of randomized trials to be superior to i.v. treatment/palliative care (med. surv.: 15 vs. 10 m). The benefit of HAI with 5-FUDR, although recommended as treatment for CRLM, is severely compromised by the 5-FUDR induced hepatotoxicity, leading eventually to sclerosing cholangitis (SC)/liver scirrhosis. We have stepwise developed a protocol for HAI of CRLM, which is superior to HAI with 5-FUDR, and, most evidently, to systemic chemotherapy. Between 1982-1997, 222 CR (L) M patients were treated within subsequent protocols (Table). In protocol A, 68 CRLM pts received HAI with 5-FUDR (A1: nonrandomized pts; A2: randomized pts). In protocol B (randomized pts.), 46 pts received 5-FUDR i.a. (via HAI) + i.v. In protocol C, systemic chemotherapy with 5-FU + FA was conducted in 34 pts with metastasized colorectal cancers, including CRLM. In protocol D 5-FU + FA was delivered via HAI in 25 pts with CRLM. In protocol E, based on in vitro phase II studies and the results of protocol D, Mitoxantrone and Mitomycin C were added to 5-FU + FA (MFFM). Fifty (50) CRLM pts received HAI with MFFM. The response rates, med. surv. times, systemic toxicity and SC rates are shown in the table. HAI with MFFM produced objective responses in 66%, the med. surv. was 27.4 m, and no SC occurred. The ports surgically placed for HAI, e.g., in protocols D and E, functioned in 90%, 82%, and 76% 6, 9, and 11 m after start of the HAI. Quality of life in protocol E was high. Nine pts from protocols D + E with either partial (PR, 7 pts) or complete (CR, 2 pts) remissions received a secondary liver resection without hospital mortality, and 7/9 pts are living 2-58 m after liver resection, 2/9 pts died 11 and 22 m after resection. [table: see text] Our learning curve to achieve optimal treatment of CRLM resulted in a protocol using HAI with MFFM. The results of this protocol (E) including the high remission rate, long median survival time, good port function, high quality of life, and, most interestingly, the possibility to downstage and resect primarily nonresectable metastases, seem to be superior to HAI with 5-FUDR of 5-FU + FA and to systemic chemotherapy with 5-FU + FA. This hypothesis is currently examined in a phase III study (HAI with MFFM vs. 5-FU + FA i.v.).
Carrasco-Labra, Alonso; Brignardello-Petersen, Romina; Santesso, Nancy; Neumann, Ignacio; Mustafa, Reem A; Mbuagbaw, Lawrence; Etxeandia Ikobaltzeta, Itziar; De Stio, Catherine; McCullagh, Lauren J; Alonso-Coello, Pablo; Meerpohl, Joerg J; Vandvik, Per Olav; Brozek, Jan L; Akl, Elie A; Bossuyt, Patrick; Churchill, Rachel; Glenton, Claire; Rosenbaum, Sarah; Tugwell, Peter; Welch, Vivian; Garner, Paul; Guyatt, Gordon; Schünemann, Holger J
2016-06-01
The current format of summary of findings (SoFs) tables for presenting effect estimates and associated quality of evidence improve understanding and assist users finding key information in systematic reviews. Users of SoF tables have demanded alternative formats to express findings from systematic reviews. We conducted a randomized controlled trial among systematic review users to compare the relative merits of a new format with the current formats of SoF tables regarding understanding, accessibility of information, satisfaction, and preference. Our primary goal was to show that the new format is not inferior to the current format. Of 390 potentially eligible subjects, 290 were randomized. Of seven items testing understanding, three showed similar results, two showed small differences favoring the new format, and two (understanding risk difference and quality of the evidence associated with a treatment effect) showed large differences favoring the new format [63% (95% confidence interval {CI}: 55, 71) and 62% (95% CI: 52, 71) more correct answers, respectively]. Respondents rated information in the alternative format as more accessible overall and preferred the new format over the current format. While providing at least similar levels of understanding for some items and increased understanding for others, users prefer the new format of SoF tables. Copyright © 2016 Elsevier Inc. All rights reserved.
Kim, Logyoung; Kim, Jee-Ae; Kim, Sanghyun
2014-01-01
The claims data of the Health Insurance Review and Assessment Service (HIRA) is an important source of information for healthcare service research. The claims data of HIRA is collected when healthcare service providers submit a claim to HIRA to be reimbursed for a service that they provided to patients. To improve the accessibility of healthcare service researchers to claims data of HIRA, HIRA has developed the Patient Samples which are extracted using a stratified randomized sampling method. The Patient Samples of HIRA consist of five tables: a table for general information (Table 20) containing socio-demographic information such as gender, age and medical aid, indicators for inpatient and outpatient services; a table for specific information on healthcare services provided (Table 30); a table for diagnostic information (Table 40); a table for outpatient prescriptions (Table 53) and a table for information on healthcare service providers (Table of providers). Researchers who are interested in using the Patient Sample data for research can apply via HIRA’s website (https://www.hira.or.kr). PMID:25078381
Rosenbaum, Sarah E; Glenton, Claire; Nylund, Hilde Kari; Oxman, Andrew D
2010-06-01
To develop a Summary of Findings (SoF) table for use in Cochrane reviews that is understandable and useful for health professionals, acceptable to Cochrane Collaboration stakeholders, and feasible to implement. We gathered stakeholder feedback on the format and content of an SoF table from an advisory group of more than 50 participants and their constituencies through e-mail consultations. We conducted user tests using a think-aloud protocol method, collecting feedback from 21 health professionals and researchers in Norway and the UK. We analyzed the feedback, defined problem areas, and generated new solutions in brainstorming workshops. Stakeholders were concerned about precision in the data representation and about production feasibility. User testing revealed unexpected comprehension problems, mainly confusion about what the different numbers referred to (class reference). Resolving the tension between achieving table precision and table simplicity became the main focus of the working group. User testing led to a table more useful and understandable for clinical audiences. We arrived at an SoF table that was acceptable to the stakeholders and in principle feasible to implement technically. Some challenges remain, including presenting continuous outcomes and technical/editorial implementation.
ERIC Educational Resources Information Center
International Federation of Library Associations, The Hague (Netherlands).
Papers on international access to information pertaining to legal research, which were presented at the 1985 conference of the International Federation of Library Associations (IFLA) include: (1) "Materials of European Intergovernmental Organizations and Their Accessibility through Available Research Tools" (Irene Berkey, Northwestern…
Zhang, Sheng; Liang, Fei; Li, Wenfeng
2017-11-01
The decision to make protocols of phase III randomized controlled trials (RCTs) publicly accessible by leading journals was a landmark event in clinical trial reporting. Here, we compared primary outcomes defined in protocols with those in publications describing the trials and in trial registration. We identified phase III RCTs published between January 1, 2012, and June 30, 2015, in The New England Journal of Medicine, The Lancet, The Journal of the American Medical Association, and The BMJ with available protocols. Consistency in primary outcomes between protocols and registries (articles) was evaluated. We identified 299 phase III RCTs with available protocols in this analysis. Out of them, 25 trials (8.4%) had some discrepancy for primary outcomes between publications and protocols. Types of discrepancies included protocol-defined primary outcome reported as nonprimary outcome in publication (11 trials, 3.7%), protocol-defined primary outcome omitted in publication (10 trials, 3.3%), new primary outcome introduced in publication (8 trials, 2.7%), protocol-defined nonprimary outcome reported as primary outcome in publication (4 trials, 1.3%), and different timing of assessment of primary outcome (4 trials, 1.3%). Out of trials with discrepancies in primary outcome, 15 trials (60.0%) had discrepancies that favored statistically significant results. Registration could be seen as a valid surrogate of protocol in 237 of 299 trials (79.3%) with regard to primary outcome. Despite unrestricted public access to protocols, selective outcome reporting persists in a small fraction of phase III RCTs. Only studies from four leading journals were included, which may cause selection bias and limit the generalizability of this finding. Copyright © 2017 Elsevier Inc. All rights reserved.
Cache Coherence Protocols for Large-Scale Multiprocessors
1990-09-01
and is compared with the other protocols for large-scale machines. In later analysis, this coherence method is designated by the acronym OCPD , which...private read misses 2 6 6 ( OCPD ) private write misses 2 6 6 Table 4.2: Transaction Types and Costs. the performance of the memory system. These...methodologies. Figure 4-2 shows the processor utiliza- tions of the Weather program, with special code in the dyn-nic post-mortem sched- 94 OCPD DlrINB
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
SU-G-206-11: The Effect of Table Height On CTDIvol and SSDE in CT Scanning: A Phantom Study
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marsh, R; Silosky, M
2016-06-15
Purpose: Localizer projection radiographs acquired prior to CT scans are used to estimate patient size, affecting the function of Automatic Tube Current Modulation (ATCM) and calculation of the Size Specific Dose Estimate (SSDE). Due to geometric effects, the projected patient size varies with scanner table height and with the orientation of the localizer (AP versus PA). Consequently, variations in scanner table height may affect both CTDIvol and the calculated size-corrected dose index (SSDE). This study sought to characterize these effects. Methods: An anthropomorphic phantom was imaged using an AP localizer, followed by a diagnostic scan using ATCM and our institution’smore » routine abdomen protocol. This was repeated at various scanner table heights, recording the scanner-reported CTDIvol for each diagnostic scan. The width of the phantom was measured from the localizer and diagnostic images using in-house software. The measured phantom width and scanner-reported CTDIvol were used to calculate SSDE. This was repeated using PA localizers followed by diagnostic scans. Results: 1) The localizer-based phantom width varied by up to 54% of the nominal phantom width between minimum and maximum table heights. 2) Changing the table height caused a variation in scanner-reported CTDIvol of a factor greater than 4.6 when using a PA localizer and almost 2 when using an AP localizer. 3) SSDE, calculated from measured phantom size and scanner-reported CTDIvol, varied by a factor of more than 2.8 when using a PA localizer and almost 1.5 when using an AP localizer. Conclusion: Our study demonstrates that off-center patient positioning affects the efficacy of ATCM, more severely when localizers are acquired in the PA rather than AP projection. Further, patient positioning errors can cause a large variation in the calculated SSDE. This hinders interpretation of SSDE for individual patients and aggregate SSDE data when evaluating CT protocols and clinical practices.« less
18 CFR 154.112 - Exception to form and composition of tariff.
Code of Federal Regulations, 2011 CFR
2011-04-01
... contain a table of contents which is incorporated as a sheet or section in the open access transmission... referenced in the open access transmission tariff. [Order 582, 60 FR 52996, Oct. 11, 1995, as amended by...
NASA Astrophysics Data System (ADS)
Gregory, K. J.; Benito, G.; Downs, P. W.
2008-06-01
Significant developments have been achieved in applicable and applied fluvial geomorphology as shown in publications of the last three decades, analyzed as the basis for using results of studies of environmental change as a basis for management. The range of types of publications and of activities are more pertinent to river channel management as a result of concern with sustainability, global climate change, environmental ethics, ecosystem health concepts and public participation. Possible applications, with particular reference to river channel changes, include those concerned with form and process, assessment of channel change, urbanization, channelization, extractive industries, impact of engineering works, historical changes in land use, and restoration with specific examples illustrated in Table 1. In order to achieve general significance for fluvial geomorphology, more theory and extension by modelling methods is needed, and examples related to morphology and process characteristics, integrated approaches, and changes of the fluvial system are collected in Table 2. The ways in which potential applications are communicated to decision-makers range from applicable outputs including publications ranging from review papers, book chapters, and books, to applied outputs which include interdisciplinary problem solving, educational outreach, and direct involvement, with examples summarized in Table 3. On the basis of results gained from investigations covering periods longer than continuous records, a protocol embracing palaeohydrological inputs for application to river channel management is illustrated and developed as a synopsis version (Table 4), demonstrating how conclusions from geomorphological research can be expressed in a format which can be considered by managers.
The Intersystem - Internetworking for space systems
NASA Astrophysics Data System (ADS)
Landauer, C.
This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Patterns of genomic and phenomic diversity in wine and table grapes
USDA-ARS?s Scientific Manuscript database
Grapes are one of the most economically and culturally important crops worldwide, and they have been bred for both winemaking and fresh consumption. Here we evaluate patterns of diversity across 33 phenotypes collected over a 17-year period from 580 table and wine grape accessions that belong to one...
Conversation Begins at Home--Around the Table.
ERIC Educational Resources Information Center
Bodner-Johnson, Barbara
1988-01-01
Suggestions are made for encouraging conversation skills in the deaf child at the family dinner table. Among suggestions to families are to use dinnertime to catch up on each other's news, make the physical environment pleasant, use modes of communication accessible to the deaf child, and be responsive to the deaf child. (DB)
A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks
Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad
2017-01-01
Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks
Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517
An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.
Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.
The XMM-Newton Science Archive and its integration into ESASky
NASA Astrophysics Data System (ADS)
Loiseau, N.; Baines, D.; Colomo, E.; Giordano, F.; Merín, B.; Racero, E.; Rodríguez, P.; Salgado, J.; Sarmiento, M.
2017-07-01
We describe the variety of functionalities of the XSA (XMM-Newton Science Archive) that allow to search and access the XMM-Newton data and catalogues. The web interface http://nxsa.esac.esa.int/ is very flexible allowing different kinds of searches by a single position or target name, or by a list of targets, with several selecting options (target type, text in the abstract, etc.), and with several display options. The resulting data can be easily broadcast to Virtual Observatory (VO) facilities for a first look analysis, or for cross-matching the results with info from other observatories. Direct access via URL or command line are also possible for scripts usage, or to link XMM-Newton data from other interfaces like Vizier, ADS, etc. The full metadata content of the XSA can be queried through the TAP (Table access Protocol) via ADQL (Astronomical Data Query Language). We present also the roadmap for future improvements of the XSA including the integration of the Upper Limit server, the on-the-fly data analysis, and the interactive visualization of EPIC sources spectra and light curves and RGS spectra, among other advanced features. Within this modern visualization philosophy XSA is also being integrated into ESASky (http://sky.esa.int). ESASky is the science-driven multi-wavelength discovery portal for all the ESA Astronomy Missions (Integral, HST, Herschel, Suzaku, Planck, etc.), and other space and ground telescope data. The system offers progressive multi-resolution all-sky projections of full mission datasets using HiPS, a new generation of HEALPix projections developed by CDS, precise footprints to connect to individual observations, and direct access to science-ready data from the underlying mission specific science archives. XMM-Newton EPIC and OM all-sky HiPS maps, catalogues and links to the observations are available through ESASky.
Revamped Website Features Easier Access to Travel Survey Data, Offers New
Datasets | News | NREL Revamped Website Features Easier Access to Travel Survey Data, Offers New Datasets Revamped Website Features Easier Access to Travel Survey Data, Offers New Datasets table. Each survey or study now has its own page, allowing users to bookmark it or provide a link to
Selection of Yeasts as Starter Cultures for Table Olives: A Step-by-Step Procedure
Bevilacqua, Antonio; Corbo, Maria Rosaria; Sinigaglia, Milena
2012-01-01
The selection of yeasts intended as starters for table olives is a complex process, including a characterization step at laboratory level and a validation at lab level and factory-scale. The characterization at lab level deals with the assessment of some technological traits (growth under different temperatures and at alkaline pHs, effect of salt, and for probiotic strains the resistance to preservatives), enzymatic activities, and some new functional properties (probiotic traits, production of vitamin B-complex, biological debittering). The paper reports on these traits, focusing both on their theoretical implications and lab protocols; moreover, there are some details on predictive microbiology for yeasts of table olives and on the use of multivariate approaches to select suitable starters. PMID:22666220
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
Simple Spectral Lines Data Model Version 1.0
NASA Astrophysics Data System (ADS)
Osuna, Pedro; Salgado, Jesus; Guainazzi, Matteo; Dubernet, Marie-Lise; Roueff, Evelyne; Osuna, Pedro; Salgado, Jesus
2010-12-01
This document presents a Data Model to describe Spectral Line Transitions in the context of the Simple Line Access Protocol defined by the IVOA (c.f. Ref[13] IVOA Simple Line Access protocol) The main objective of the model is to integrate with and support the Simple Line Access Protocol, with which it forms a compact unit. This integration allows seamless access to Spectral Line Transitions available worldwide in the VO context. This model does not provide a complete description of Atomic and Molecular Physics, which scope is outside of this document. In the astrophysical sense, a line is considered as the result of a transition between two energy levels. Under the basis of this assumption, a whole set of objects and attributes have been derived to define properly the necessary information to describe lines appearing in astrophysical contexts. The document has been written taking into account available information from many different Line data providers (see acknowledgments section).
An Instructional Consultation Service for Graduate Teaching Assistants.
ERIC Educational Resources Information Center
Habel, J. C.; Graveel, J. G.
1988-01-01
Described is a support program that guides prospective college teachers in teaching an introductory soil science laboratory course. Ideas are presented about the preparation for teaching and concerns of teaching assistants. A table citing classroom observation protocol is included. (RT)
Protocol Handbook - A Guide for the Base Protocol Officer
1986-04-01
printed or otherwise impressed on paper napkins , boxes, or anythi-ng designed ftar temporary use and discard. Advertisitig s;Igns are not to be...colored cloth and napkins are fine and add to the setting of the luncheon. There should be a centerpiece, but no candles are used on luncheon tables. Th~e...time, place, dress, and occasion. They should be in the third person, in black ink with the date and time written completely. The dress is handwritten
Optimizing the NASA Technical Report Server
NASA Technical Reports Server (NTRS)
Nelson, Michael L.; Maa, Ming-Hokng
1996-01-01
The NASA Technical Report Server (NTRS), a World Wide Web report distribution NASA technical publications service, is modified for performance enhancement, greater protocol support, and human interface optimization. Results include: Parallel database queries, significantly decreasing user access times by an average factor of 2.3; access from clients behind firewalls and/ or proxies which truncate excessively long Uniform Resource Locators (URLs); access to non-Wide Area Information Server (WAIS) databases and compatibility with the 239-50.3 protocol; and a streamlined user interface.
USDA-ARS?s Scientific Manuscript database
The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...
Evolution of the Data Access Protocol in Response to Community Needs
NASA Astrophysics Data System (ADS)
Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.
2012-12-01
Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that server functions can be used to perform operations on large volumes of data and return results that are far smaller than would be required to achieve the same outcomes via client-side processing. We are using information from these efforts to inform the design of server functions in DAP4. Each of the three areas of DAP4 advancement is being guided by input from a number of community members, including an OPULS Advisory Committee.
Does chlorhexidine prevent dry socket?
Richards, Derek
2012-01-01
The BBO (Bibliografia Brasileira de Odontologia), Biomed Central, Cochrane Library, Directory of Open Access Journals, LILACS, Open-J-Gate, OpenSIGLE, PubMed, Sabinet and Science-Direct databases were searched. Articles were selected for review from the search results on the basis of their compliance with the broad inclusion criteria: relevant to the review question; and prospective two-arm (or more) clinical study. The primary outcome measure was the incidence of AO reported at the patient level. Two reviewers (VY and SM) independently extracted data and assessed the quality of the accepted articles. Individual dichotomous datasets for the control and test group were extracted from each article. Where possible, missing data were calculated from information given in the text or tables. In addition, authors were contacted in order to obtain missing information. Datasets were assessed for their clinical and methodological heterogeneity following Cochrane guidelines. Meta-analysis was conducted with homogeneous datasets. Publication bias was assessed by use of a funnel plot and Egger's regression. Ten randomised trials were included; almost all involved the removal of third molars. Only two of six identified application protocols (single application of chlorhexidine 0.2% gel or multiple application of 0.12% rinse versus placebo) were found to significantly decrease the incidence of AO. Within the limitations of this review, only two of six identified application protocols were found to significantly decrease the incidence of AO. The evidence for both protocols is weak and may be challenged on the grounds of high risk of selection, detection/performance and attrition bias. This systematic review could not identify sufficient evidence supporting the use of chlorhexidine for the prevention of AO. Chlorhexidine seems not to cause any significantly higher adverse reactions than placebo. Future high-quality randomised control trials are needed to provide conclusive evidence on this topic.
An interoperability experiment for sharing hydrological rating tables
NASA Astrophysics Data System (ADS)
Lemon, D.; Taylor, P.; Sheahan, P.
2013-12-01
The increasing demand on freshwater resources is requiring authorities to produce more accurate and timely estimates of their available water. Calculation of continuous time-series of river discharge and storage volumes generally requires rating tables. These approximate relationships between two phenomena, such as river level and discharge, and allow us to produce continuous estimates of a phenomenon that may be impractical or impossible to measure directly. Standardised information models or access mechanisms for rating tables are required to support sharing and exchange of water flow data. An Interoperability Experiment (IE) is underway to test an information model that describes rating tables, the observations made to build these ratings, and river cross-section data. The IE is an initiative of the joint World Meteorological Organisation/Open Geospatial Consortium's Hydrology Domain Working Group (HydroDWG) and the model will be published as WaterML2.0 part 2. Interoperability Experiments (IEs) are low overhead, multiple member projects that are run under the OGC's interoperability program to test existing and emerging standards. The HydroDWG has previously run IEs to test early versions of OGC WaterML2.0 part 1 - timeseries. This IE is focussing on two key exchange scenarios: Sharing rating tables and gauging observations between water agencies. Through the use of standard OGC web services, rating tables and associated data will be made available from water agencies. The (Australian) Bureau of Meteorology will retrieve rating tables on-demand from water authorities, allowing the Bureau to run conversions of data within their own systems. Exposing rating tables and gaugings for online analysis and educational purposes. A web client will be developed to enable exploration and visualization of rating tables, gaugings and related metadata for monitoring points. The client gives a quick view into available rating tables, their periods of applicability and the standard deviation of observations against the relationship. An example of this client running can be seen at the link provided. The result of the IE will form the basis for the standardisation of WaterML2.0 part 2. The use of the standard will lead to increased transparency and accessibility of rating tables, while also improving general understanding of this important hydrological concept.
50 CFR 660.333 - Open access non-groundfish trawl fishery-management measures.
Code of Federal Regulations, 2011 CFR
2011-10-01
... engaged in fishing for pink shrimp, ridgeback prawns, California halibut, or sea cucumbers. Trip limits... in the pink shrimp fishery are in Tables 3 (North) and 3 (South) of this subpart. The table also... and Game Code, section 8595, which states: “Prawns or shrimp may be taken for commercial purposes with...
50 CFR 660.333 - Open access non-groundfish trawl fishery-management measures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... engaged in fishing for pink shrimp, ridgeback prawns, California halibut, or sea cucumbers. Trip limits... in the pink shrimp fishery are in Tables 3 (North) and 3 (South) of this subpart. The table also... and Game Code, section 8595, which states: “Prawns or shrimp may be taken for commercial purposes with...
Public Health Planning for Vulnerable Populations and Pandemic Influenza
2008-12-01
Table 8. Environmental Health Support ........................................................................35 Table 9. Nursing Support...more than 500 deaths. Towns and communities were terribly affected. Augusta was the hardest-hit city in the state. Trained nurses were far too few...Medical News Today, (January 16, 2006) http://www.medicalnewstoday.com/articles/36234.php (accessed 29 November 2008). 4 As a consequence, nursing
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Data aggregation in wireless sensor networks using the SOAP protocol
NASA Astrophysics Data System (ADS)
Al-Yasiri, A.; Sunley, A.
2007-07-01
Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.
Using OPeNDAP's Data-Services Framework to Lift Mash-Ups above Blind Dates
NASA Astrophysics Data System (ADS)
Gallagher, J. H. R.; Fulker, D. W.
2015-12-01
OPeNDAP's data-as-service framework (Hyrax) matches diverse sources with many end-user tools and contexts. Keys to its flexibility include: A data model embracing tabular data alongside n-dim arrays and other structures useful in geoinformatics. A REST-like protocol that supports—via suffix notation—a growing set of output forms (netCDF, XML, etc.) plus a query syntax for subsetting. Subsetting applies (via constraints on column values) to tabular data or (via constraints on indices or coordinates) to array-style data . A handler-style architecture that admits a growing set of input types. Community members may contribute handlers, making Hyrax effective as middleware, where N sources are mapped to M outputs with order N+M effort (not NxM). Hyrax offers virtual aggregations of source data, enabling granularity aimed at users, not data-collectors. OPeNDAP-access libraries exist in multiple languages, including Python, Java, and C++. Recent enhancements are increasing this framework's interoperability (i.e., its mash-up) potential. Extensions implemented as servlets—running adjacent to Hyrax—are enriching the forms of aggregation and enabling new protocols: User-specified aggregations, namely, applying a query to (huge) lists of source granules, and receiving one (large) table or zipped netCDF file. OGC (Open Geospatial Consortium) protocols, WMS and WCS. A Webification (W10n) protocol that returns JavaScript Object Notation (JSON). Extensions to OPeNDAP's query language are reducing transfer volumes and enabling new forms of inspection. Advances underway include: Functions that, for triangular-mesh sources, return sub-meshes spec'd via geospatial bounding boxes. Functions that, for data from multiple, satellite-borne sensors (with differing orbits), select observations based on coincidence. Calculations of means, histograms, etc. that greatly reduce output volumes.. Paths for communities to contribute new server functions (in Python, e.g.) that data providers may incorporate into Hyrax via installation parameters. One could say Hyrax itself is a mash-up, but we suggest it as an instrument for a mash-up artist's toolbox. This instrument can support mash-ups built on netCDF files, OGC protocols, JavaScript Web pages, and/or programs written in Python, Java, C or C++.
NASA Astrophysics Data System (ADS)
Chase, Patrick; Vondran, Gary
2011-01-01
Tetrahedral interpolation is commonly used to implement continuous color space conversions from sparse 3D and 4D lookup tables. We investigate the implementation and optimization of tetrahedral interpolation algorithms for GPUs, and compare to the best known CPU implementations as well as to a well known GPU-based trilinear implementation. We show that a 500 NVIDIA GTX-580 GPU is 3x faster than a 1000 Intel Core i7 980X CPU for 3D interpolation, and 9x faster for 4D interpolation. Performance-relevant GPU attributes are explored including thread scheduling, local memory characteristics, global memory hierarchy, and cache behaviors. We consider existing tetrahedral interpolation algorithms and tune based on the structure and branching capabilities of current GPUs. Global memory performance is improved by reordering and expanding the lookup table to ensure optimal access behaviors. Per multiprocessor local memory is exploited to implement optimally coalesced global memory accesses, and local memory addressing is optimized to minimize bank conflicts. We explore the impacts of lookup table density upon computation and memory access costs. Also presented are CPU-based 3D and 4D interpolators, using SSE vector operations that are faster than any previously published solution.
Shoorooei, Marie; Hoseinzadeh, Abdul Hadi; Maali-Amiri, Reza; Allahyari, Hossein; Torkzadeh-Mahani, Masoud
2018-04-01
The two-spotted spider mite, Tetranychus uticae Koch (Acari: Tetranychidae), is globally one of the most devastating pests that feed on numerous crops, including common bean (Phaseolus vulgaris L.). This study was aimed to evaluate the effects of genotype and morphological attributes of common bean on T. uticae. Forty common bean accessions were used to investigate antixenosis and antibiosis through assessing mite feeding preference and reproduction under laboratory conditions. Three resistant (i.e., 56, 63, 238) and two susceptible (i.e., 182, 236) accessions, along with cultivars Naz (resistant) and Akhtar (susceptible), were used in a life-table study. Both antixenosis and antibiosis mechanism were observed in all of the accessions, albeit a negative correlation occurred. Significant differences were observed for all traits of T. urticae: developmental time of immature stages, reproduction, adult longevity and life-table parameters. Based on the intrinsic rate of increase, the accessions 56, 63, 182, 238, and cv. Naz impose high antibiotic effects on T. urticae. Although significant variation existed among accessions for morphological factors, only glandular trichomes correlated with mite fecundity and feeding preference.
ERIC Educational Resources Information Center
Glazerman, Steven; Max, Jeffrey
2011-01-01
This appendix describes the methods and provides further detail to support the evaluation brief, "Do Low-Income Students Have Equal Access to the Highest-Performing Teachers?" (Contains 8 figures, 6 tables and 5 footnotes.) [For the main report, "Do Low-Income Students Have Equal Access to the Highest-Performing Teachers? NCEE…
ERIC Educational Resources Information Center
Pritchard-Schoch, Teresa
1995-01-01
Examines developments among public record information providers, including a shift from file acquisition to entire company acquisition. Highlights include a table of remote access to public records by state; pricing information; privacy issues; and information about the three main companies offering access to public records: LEXIS, CDB Infotek,…
Mineral access status of the federal lands
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sowell, E.
1983-01-01
Tables summarize the legal status of federal lands with respect to access for oil and gas exploration and production and a state-by-state description of the acreage formally withdrawn from the operation of the mineral leasing laws. There is likely some overlap between land currently under lease and that which is formally withdrawn because of pre-existing rights, a situation which also exists with land pending wilderness designation. The report examines various types of withdrawal authority: general; for the conservation of minerals; for scenic, historic, or recreational values; to protect fish and wildlife; to protect wild and natural areas; for military uses;more » for multiple use; and lands under lease. The paper concludes that closure of land to mineral leasing has made access to a large portion of federal land impossible. Until information is available on the extent of oil and gas resources, the true significance of the access status will remain unknown. 22 tables.« less
Wireless Distribution Systems To Support Medical Response to Disasters
Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.
2005-01-01
We discuss the design of multi-hop access networks with multiple gateways that supports medical response to disasters. We examine and implement protocols to ensure high bandwidth, robust, self-healing and secure wireless multi-hop access networks for extreme conditions. Address management, path setup, gateway discovery and selection protocols are described. Future directions and plans are also considered. PMID:16779171
Detailed analysis of routing protocols with different network limitations
NASA Astrophysics Data System (ADS)
Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan
2016-12-01
In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.
A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol.
Zeng, Ping; Tan, Qingping; Meng, Xiankai; Shao, Zeming; Xie, Qinzheng; Yan, Ying; Cao, Wei; Xu, Jianjun
2017-01-01
In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on-all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications.
A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol
Tan, Qingping; Meng, Xiankai; Shao, Zeming; Xie, Qinzheng; Yan, Ying; Cao, Wei; Xu, Jianjun
2017-01-01
In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on—all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications. PMID:28399157
Barateau, Anaïs; Garlopeau, Christopher; Cugny, Audrey; De Figueiredo, Bénédicte Henriques; Dupin, Charles; Caron, Jérôme; Antoine, Mikaël
2015-03-01
We aimed to identify the most accurate combination of phantom and protocol for image value to density table (IVDT) on volume-modulated arc therapy (VMAT) dose calculation based on kV-Cone-beam CT imaging, for head and neck (H&N) and pelvic localizations. Three phantoms (Catphan(®)600, CIRS(®)062M (inner phantom for head and outer phantom for body), and TomoTherapy(®) "Cheese" phantom) were used to create IVDT curves of CBCT systems with two different CBCT protocols (Standard-dose Head and Standard Pelvis). Hounsfield Unit (HU) time stability and repeatability for a single On-Board-Imager (OBI) and compatibility of two distinct devices were assessed with Catphan(®)600. Images from the anthropomorphic phantom CIRS ATOM(®) for both CT and CBCT modalities were used for VMAT dose calculation from different IVDT curves. Dosimetric indices from CT and CBCT imaging were compared. IVDT curves from CBCT images were highly different depending on phantom used (up to 1000 HU for high densities) and protocol applied (up to 200 HU for high densities). HU time stability was verified over seven weeks. A maximum difference of 3% on the dose calculation indices studied was found between CT and CBCT VMAT dose calculation across the two localizations using appropriate IVDT curves. One IVDT curve per localization can be established with a bi-monthly verification of IVDT-CBCT. The IVDT-CBCTCIRS-Head phantom with the Standard-dose Head protocol was the most accurate combination for dose calculation on H&N CBCT images. For pelvic localizations, the IVDT-CBCTCheese established with the Standard Pelvis protocol provided the best accuracy. Copyright © 2015 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.
A Study of Current World Telecommunications and a Projection of the Future
1992-09-01
SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) A STUDY OF CURRENT...51 b. Integrated Services Digital Network 53 c. Network Switching ...... ........... 54 d. SS7 ...54 Table IX PERCENTAGE OF CO WITH SS7 CAPABILITY FOR THE GROUP OF SEVEN ............. .................. 55 Table X TRENDS, FORECAST IN
ToxRefDB - Release user-friendly web-based tool for mining ToxRefDB
The updated URL link is for a table of NCCT ToxCast public datasets. The next to last row of the table has the link for the US EPA ToxCast ToxRefDB Data Release October 2014. ToxRefDB provides detailed chemical toxicity data in a publically accessible searchable format. ToxRefD...
Canopy accession patterns of table mountain and pitch pines during the 19th and 20th centuries
Patrick H. Brose; Thomas A. Waldrop
2012-01-01
A dendrochronology study was conducted in three upland yellow pine stands in Georgia to determine whether the individual Table Mountain (Pinus pungens) and pitch (P. rigida) pines originated in sunny gaps or shaded understories, whether they grew uninterrupted into the canopy or were assisted by one or more releases, and whether...
Accessing the Unsaid: The Role of Scalar Alternatives in Children's Pragmatic Inference
ERIC Educational Resources Information Center
Barner, David; Brooks, Neon; Bale, Alan
2011-01-01
When faced with a sentence like, "Some of the toys are on the table", adults, but not preschoolers, compute a scalar implicature, taking the sentence to imply that not all the toys are on the table. This paper explores the hypothesis that children fail to compute scalar implicatures because they lack knowledge of relevant scalar alternatives to…
New Sources of Active Duty Military Personnel: The Prior Service Accessions Pool.
1981-10-01
Age Group Classification 20...level. -30- Table 15 E.IPLOYMENT STATUS BY AGE AN[) RACE (Iii thotisands) Age Group Classification 20-23 24-29 30-34 35-39 40-49 50-60 Total White...alternative job than for full time workers. Table 17 NUMBER OF VETERANS WORKING LESS THAN 35 HOURS (In thousands) Age Group Classification 20-23
Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow
2017-01-01
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...
Development and validation of a remote home safety protocol.
Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon
2018-02-01
Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.
Analyzing the effect of routing protocols on media access control protocols in radio networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrett, C. L.; Drozda, M.; Marathe, A.
2002-01-01
We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less
Changeable HA to improve MIPv6 protocol
NASA Astrophysics Data System (ADS)
Hu, Qing-gui
2015-12-01
For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.
Helping Students Interpret Large-Scale Data Tables
ERIC Educational Resources Information Center
Prodromou, Theodosia
2016-01-01
New technologies have completely altered the ways that citizens can access data. Indeed, emerging online data sources give citizens access to an enormous amount of numerical information that provides new sorts of evidence used to influence public opinion. In this new environment, two trends have had a significant impact on our increasingly…
Community College Retention and Access Issues: A View from the Field
ERIC Educational Resources Information Center
Rankin, Kristie R.; Katsinas, Stephen G.; Hardy, David E.
2011-01-01
Drawing on Rankin's 2008 study and literature on retention and community colleges, this study presents perceptions of community college Chief Executive Officers (CEOs) and Chief Academic Officers (CAOs) in relation to issues affecting retention and access. Childcare, transportation, and funding concerns are examined. (Contains 2 tables.)
New additions to the National Plant Germplasm System's Beta collection: Southern Morocco collection
USDA-ARS?s Scientific Manuscript database
The USDA Agricultural Research Service’s National Plant Germplasm System’s (NPGS) Beta collection is comprised of 2,541 accessions from 14 species. The largest number of accessions is from Beta vulgaris ssp. vulgaris, (domesticated beet crops – table, leaf (Swiss chard), fodder and, primarily, sugar...
Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
2017-01-01
ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341
McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
2017-08-15
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.
A Mobile Satellite Experiment (MSAT-X) network definition
NASA Technical Reports Server (NTRS)
Wang, Charles C.; Yan, Tsun-Yee
1990-01-01
The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.
Distributed reservation-based code division multiple access
NASA Astrophysics Data System (ADS)
Wieselthier, J. E.; Ephremides, A.
1984-11-01
The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.
CSMA/RN: A universal protocol for gigabit networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
NASA Astrophysics Data System (ADS)
Loveless, R.; Erhard, P.; Ficenec, J.; Gather, K.; Heath, G.; Iacovacci, M.; Kehres, J.; Mobayyen, M.; Notz, D.; Orr, R.; Orr, R.; Sephton, A.; Stroili, R.; Tokushuku, K.; Vogel, W.; Whitmore, J.; Wiggers, L.
1989-12-01
The ZEUS collaboration is building a system to monitor, control and document the hardware of the ZEUS detector. This system is based on a network of VAX computers and microprocessors connected via ethernet. The database for the hardware values will be ADAMO tables; the ethernet connection will be DECNET, TCP/IP, or RPC. Most of the documentation will also be kept in ADAMO tables for easy access by users.
ERIC Educational Resources Information Center
Zou, Junhua; Liu, Qingtang; Yang, Zongkai
2012-01-01
Based on Competence Motivation Theory (CMT), a Moodle course for schoolchildren's table tennis learning was developed (The URL is http://www.bssepp.com, and this course allows guest access). The effects of the course on students' knowledge, perceived competence and interest were evaluated through quantitative methods. The sample of the study…
A Network Centric Warfare (NCW) Compliance Process for Australian Defence
2006-08-01
discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements
Incidence of DCS and oxygen toxicity in chamber attendants: a 28-year experience.
Witucki, Pete; Duchnick, Jay; Neuman, Tom; Grover, Ian
2013-01-01
Decompression sickness (DCS) and central nervous system oxygen toxicity are inherent risks for "inside" attendants (IAs) of hyperbaric chambers. At the Hyperbaric Medicine Center at the University of California San Diego (UCSD), protocols have been developed for decompressing IAs. Protocol 1: For a total bottom time (TBT) of less than 80 minutes at 2.4 atmospheres absolute (atm abs) or shallower, the U.S. Navy (1955) no-decompression tables were utilized. Protocol 2: For a TBT between 80 and 119 minutes IAs breathed oxygen for 15 minutes prior to initiation of ascent. Protocol 3: For a TBT between 120-139 minutes IAs breathed oxygen for 30 minutes prior to ascent. These protocols have been utilized for approximately 28 years and have produced zero cases of DCS and central nervous system oxygen toxicity. These results, based upon more than 24,000 exposures, have an upper limit of risk of DCS and oxygen toxicity of 0.02806 (95% CI) using UCSD IA decompression Protocol 1, 0.00021 for Protocol 2, and 0.00549 for Protocol 3. We conclude that the utilization of this methodology may be useful at other sea-level multiplace chambers.
Ferrara, Giuseppe; Gallotta, Alessandra; Pacucci, Carmela; Matarrese, Angela Maria Stella; Mazzeo, Andrea; Giancaspro, Angelica; Gadaleta, Agata; Piazzolla, Francesca; Colelli, Giancarlo
2017-12-01
Puglia is the most important region in Italy for table grape production. Since consumers look for new products, the number of table grape varieties has greatly increased in recent years. In a survey in the Puglia region, we identified several years ago a potential mutation of the cv. Victoria. We described this accession in comparison with the standard Victoria for some amphelographic traits. All the characteristics were very similar to the standard Victoria except for the berry shape, which was significantly more elongated. Moreover, the berry of the mutated Victoria showed higher firmness, lightness and chroma than the standard one, with a more intense yellow colour of the skin (appreciated by consumers). The molecular characterisation with 25 SSR markers showed that normal and mutant Victoria were genetically identical at all the analysed loci, thus suggesting that the two accessions could be considered as clones with the difference in berry shape probably due to a somatic mutation. This mutation of the cv. Victoria may have interesting perspective for the market since consumers are always attracted by different shape and colour of the fruits (consumers buy with eyes). This accession can be an alternative clone of the already known standard Victoria. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.
Design study of the accessible focal plane telescope for shuttle
NASA Technical Reports Server (NTRS)
1976-01-01
The design and cost analysis of an accessible focal plane telescope for Spacelab is presented in blueprints, tables, and graphs. Topics covered include the telescope tube, the telescope mounting, the airlock plus Spacelab module aft plate, the instrument adapter, and the instrument package. The system allows access to the image plane with instrumentation that can be operated by a scientist in a shirt sleeve environment inside a Spacelab module.
Reference manual for data base on Nevada water-rights permits
Cartier, K.D.; Bauer, E.M.; Farnham, J.L.
1995-01-01
The U.S. Geological Survey and Nevada Division of Water Resources have cooperatively developed and implemented a data-base system for managing water-rights permit information for the State of Nevada. The Water-Rights Permit data base is part of an integrated system of computer data bases using the Ingres Relational Data-Base Manage-ment System, which allows efficient storage and access to water information from the State Engineer's office. The data base contains a main table, three ancillary tables, and five lookup tables, as well as a menu-driven system for entering, updating, and reporting on the data. This reference guide outlines the general functions of the system and provides a brief description of data tables and data-entry screens.
Reference manual for data base on Nevada well logs
Bauer, E.M.; Cartier, K.D.
1995-01-01
The U.S. Geological Survey and Nevada Division of Water Resources are cooperatively using a data base for are cooperatively using a data base for managing well-log information for the State of Nevada. The Well-Log Data Base is part of an integrated system of computer data bases using the Ingres Relational Data-Base Management System, which allows efficient storage and access to water information from the State Engineer's office. The data base contains a main table, two ancillary tables, and nine lookup tables, as well as a menu-driven system for entering, updating, and reporting on the data. This reference guide outlines the general functions of the system and provides a brief description of data tables and data-entry screens.
Bleve, Gianluca; Tufariello, Maria; Durante, Miriana; Grieco, Francesco; Ramires, Francesca Anna; Mita, Giovanni; Tasioula-Margari, Maria; Logrieco, Antonio Francesco
2015-04-01
Table olives are one of the most important traditional fermented vegetables in Europe and their world consumption is constantly increasing. Conservolea and Kalamàta are the most important table olives Greek varieties. In the Greek system, the final product is obtained by spontaneous fermentations, without any chemical debittering treatment. This natural fermentation process is not predictable and strongly influenced by the physical-chemical conditions and by the presence of microorganisms contaminating the olives. Natural fermentations of Conservolea and Kalamàta cultivars black olives were studied in order to determine microbiological, biochemical and chemical evolution during the process. Following the process conditions generally used by producers, in both cultivars, yeasts were detected throughout the fermentation, whereas lactic acid bacteria (LAB) appeared in the last staged of the process. A new optimized specific protocol was developed to select autochthonous yeast and LAB isolates that can be good candidates as starters. These microorganisms were pre-selected for their ability to adapt to model brines, to have beta-glucosidase activity, not to produce biogenic amines. Chemical compounds deriving by microbiological activities and associated to the three different phases (30, 90 and 180 days) of the fermentation process were identified and were proposed as chemical descriptors to follow the fermentation progress. Copyright © 2014 Elsevier Ltd. All rights reserved.
Boffeli, Troy J; Collier, Rachel C; Gervais, Samuel J
Assessing ankle stability in nondisplaced Lauge-Hansen supination external rotation type II injuries requires stress imaging. Gravity stress mortise imaging is routinely used as an alternative to manual stress imaging to assess deltoid integrity with the goal of differentiating type II from type IV injuries in cases without a posterior or medial fracture. A type II injury with a nondisplaced fibula fracture is typically treated with cast immobilization, and a type IV injury is considered unstable and often requires operative repair. The present case series (two patients) highlights a standardized 2-view gravity stress imaging protocol and introduces the gravity stress cross-table lateral view. The gravity stress cross-table lateral view provides a more thorough evaluation of the posterior malleolus owing to the slight external rotation and posteriorly directed stress. External rotation also creates less bony overlap between the tibia and fibula, allowing for better visualization of the fibula fracture. Gravity stress imaging confirmed medial-sided injury in both cases, confirming the presence of supination external rotation type IV or bimalleolar equivalent fractures. Open reduction and internal fixation was performed, and both patients achieved radiographic union. No further treatment was required at 21 and 33 months postoperatively. Copyright © 2017 American College of Foot and Ankle Surgeons. Published by Elsevier Inc. All rights reserved.
TOPCAT -- Tool for OPerations on Catalogues And Tables
NASA Astrophysics Data System (ADS)
Taylor, Mark
TOPCAT is an interactive graphical viewer and editor for tabular data. It has been designed for use with astronomical tables such as object catalogues, but is not restricted to astronomical applications. It understands a number of different astronomically important formats, and more formats can be added. It is designed to cope well with large tables; a million rows by a hundred columns should not present a problem even with modest memory and CPU resources. It offers a variety of ways to view and analyse the data, including a browser for the cell data themselves, viewers for information about table and column metadata, tools for joining tables using flexible matching algorithms, and visualisation facilities including histograms, 2- and 3-dimensional scatter plots, and density maps. Using a powerful and extensible Java-based expression language new columns can be defined and row subsets selected for separate analysis. Selecting a row can be configured to trigger an action, for instance displaying an image of the catalogue object in an external viewer. Table data and metadata can be edited and the resulting modified table can be written out in a wide range of output formats. A number of options are provided for loading data from external sources, including Virtual Observatory (VO) services, thus providing a gateway to many remote archives of astronomical data. It can also interoperate with other desktop tools using the SAMP protocol. TOPCAT is written in pure Java and is available under the GNU General Public Licence. Its underlying table processing facilities are provided by STIL, the Starlink Tables Infrastructure Library.
Delayed treatment of decompression sickness with short, no-air-break tables: review of 140 cases.
Cianci, Paul; Slade, John B
2006-10-01
Most cases of decompression sickness (DCS) in the U.S. are treated with hyperbaric oxygen using U.S. Navy Treatment Tables 5 and 6, although detailed analysis shows that those tables were based on limited data. We reviewed the development of these protocols and offer an alternative treatment table more suitable for monoplace chambers that has proven effective in the treatment of DCS in patients presenting to our facility. We reviewed the outcomes for 140 cases of DCS in civilian divers treated with the shorter tables at our facility from January 1983 through December 2002. Onset of symptoms averaged 9.3 h after surfacing. At presentation, 44% of the patients demonstrated mental aberration. The average delay from onset of symptoms to treatment was 93.5 h; median delay was 48 h. Complete recovery in the total group of 140 patients was 87%. When 30 patients with low probability of DCS were excluded, the recovery rate was 98%. All patients with cerebral symptoms recovered. Patients with the highest severity scores showed a high rate of complete recovery (97.5%). Short oxygen treatment tables as originally described by Hart are effective in the treatment of DCS, even with long delays to definitive recompression that often occur among civilian divers presenting to a major Divers Alert Network referral center.
The View from Here: Emergence of Graphical Literacy
ERIC Educational Resources Information Center
Roberts, Kathryn L.; Brugar, Kristy A.
2017-01-01
The purpose of this study is to describe upper elementary students' understandings of four graphical devices that frequently occur in social studies texts: captioned images, maps, tables, and timelines. Using verbal protocol data collection procedures, we collected information on students' metacognitive processes when they were explicitly asked to…
Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory
NASA Astrophysics Data System (ADS)
Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.
2014-01-01
Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an operational data cube service to be delivered in mid-2014. An associated user-installable VO data service framework will provide the capabilities required to publish VO-compatible multi-dimensional images or data cubes.
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
NASA Technical Reports Server (NTRS)
Israel, David J.
2005-01-01
The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.
Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom
2014-08-01
This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.
Application of an access technology delivery protocol to two children with cerebral palsy.
Mumford, Leslie; Chau, Tom
2015-07-14
This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.
Honest broker protocol streamlines research access to data while safeguarding patient privacy.
Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti
2008-11-06
At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm
Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.
2014-01-01
The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339
Understanding the Graphical Challenges Faced by Vision-Impaired Students in Australian Universities
ERIC Educational Resources Information Center
Butler, Matthew; Holloway, Leona; Marriott, Kim; Goncu, Cagatay
2017-01-01
Information graphics such as plots, maps, plans, charts, tables and diagrams form an integral part of the student learning experience in many disciplines. However, for a vision impaired student accessing such graphical materials can be problematic. This research seeks to understand the current state of accessible graphics provision in Australian…
New additions to the National Plant Germplasm System’s Beta collection: Southern Morocco expedition
USDA-ARS?s Scientific Manuscript database
The USDA Agricultural Research Service’s National Plant Germplasm System’s (NPGS) Beta collection is comprised of 2,541 accessions from 14 species. The largest number of accessions is from Beta vulgaris ssp. vulgaris, (domesticated beet crops – table, leaf (Swiss chard), fodder and, primarily, sugar...
The Relationship between Web Accessibility Policy and Practice in Postsecondary Institutions
ERIC Educational Resources Information Center
Whitney, Michael P.
2009-01-01
From computer workstations to the world of the web, statutes and policies have afforded students with disabilities the right to participate in postsecondary education in a non-discriminatory manner. Automatic doors and adjustable tables are a commonplace on campuses and represent prime examples of accessible policy adherence, but what affect do…
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
47 CFR 79.109 - Activating accessibility features.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication
Seo, Hwajeong; Kim, Hyunjin; Park, Taehwan; Lee, Yeoncheol; Liu, Zhe; Kim, Howon
2013-01-01
Elliptic curve cryptography (ECC) is one of the most promising public-key techniques in terms of short key size and various crypto protocols. For this reason, many studies on the implementation of ECC on resource-constrained devices within a practical execution time have been conducted. To this end, we must focus on scalar multiplication, which is the most expensive operation in ECC. A number of studies have proposed pre-computation and advanced scalar multiplication using a non-adjacent form (NAF) representation, and more sophisticated approaches have employed a width-w NAF representation and a modified pre-computation table. In this paper, we propose a new pre-computation method in which zero occurrences are much more frequent than in previous methods. This method can be applied to ordinary group scalar multiplication, but it requires large pre-computation table, so we combined the previous method with ours for practical purposes. This novel structure establishes a new feature that adjusts speed performance and table size finely, so we can customize the pre-computation table for our own purposes. Finally, we can establish a customized look-up table for embedded microprocessors. PMID:23881143
ERIC Educational Resources Information Center
Packer, Jaclyn; Reuschel, William
2018-01-01
Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…
Comparison of two MAC protocols based on LEO satellite networks
NASA Astrophysics Data System (ADS)
Guan, Mingxiang; Wang, Ruichun
2009-12-01
With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
Network Security Visualization
1999-09-27
performing SQL generation and result-set binding, inserting acquired security events into the database and gathering the requested data for Console scene...objects is also auto-generated by a VBA script. Built into the auto-generated table access objects are the preferred join paths between tables. This...much of the Server itself) never have to deal with SQL directly. This is one aspect of laying the groundwork for supporting RDBMSs from multiple vendors
2017-01-01
each change and its implementation status as well as supporting the audit of products to verify conformance to requirements. Through these change...management process for modifying DSAID aligns with information technology and project management industry standards. GAO reviewed DOD documents, and...Acknowledgments 32 Related GAO Products 33 Tables Table 1: Roles and Access Rights for Users of the Defense Sexual Assault Incident Database (DSAID
Code of Federal Regulations, 2012 CFR
2012-07-01
...: Tent or trailer spaces, drinking water, access road, refuse containers, toilet facilities, personal fee..., roads, overlook sites, visitors' centers, scenic drives, toilet facilities, picnic tables, and boat...
Code of Federal Regulations, 2013 CFR
2013-07-01
...: Tent or trailer spaces, drinking water, access road, refuse containers, toilet facilities, personal fee..., roads, overlook sites, visitors' centers, scenic drives, toilet facilities, picnic tables, and boat...
Code of Federal Regulations, 2014 CFR
2014-07-01
...: Tent or trailer spaces, drinking water, access road, refuse containers, toilet facilities, personal fee..., roads, overlook sites, visitors' centers, scenic drives, toilet facilities, picnic tables, and boat...
NASA Astrophysics Data System (ADS)
Nakamura, Kazuyuki; Sasao, Tsutomu; Matsuura, Munehiro; Tanaka, Katsumasa; Yoshizumi, Kenichi; Nakahara, Hiroki; Iguchi, Yukihiro
2006-04-01
A large-scale memory-technology-based programmable logic device (PLD) using a look-up table (LUT) cascade is developed in the 0.35-μm standard complementary metal oxide semiconductor (CMOS) logic process. Eight 64 K-bit synchronous SRAMs are connected to form an LUT cascade with a few additional circuits. The features of the LUT cascade include: 1) a flexible cascade connection structure, 2) multi phase pseudo asynchronous operations with synchronous static random access memory (SRAM) cores, and 3) LUT-bypass redundancy. This chip operates at 33 MHz in 8-LUT cascades at 122 mW. Benchmark results show that it achieves a comparable performance to field programmable gate array (FPGAs).
A carrier sensed multiple access protocol for high data base rate ring networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.
Review and publication of protocol submissions to Trials - what have we learned in 10 years?
Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G
2016-12-16
Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
Zero-Copy Objects System software enables application data to be encapsulated in layers of communication protocol without being copied. Indirect referencing enables application source data, either in memory or in a file, to be encapsulated in place within an unlimited number of protocol headers and/or trailers. Zero-copy objects (ZCOs) are abstract data access representations designed to minimize I/O (input/output) in the encapsulation of application source data within one or more layers of communication protocol structure. They are constructed within the heap space of a Simple Data Recorder (SDR) data store to which all participating layers of the stack must have access. Each ZCO contains general information enabling access to the core source data object (an item of application data), together with (a) a linked list of zero or more specific extents that reference portions of this source data object, and (b) linked lists of protocol header and trailer capsules. The concatenation of the headers (in ascending stack sequence), the source data object extents, and the trailers (in descending stack sequence) constitute the transmitted data object constructed from the ZCO. This scheme enables a source data object to be encapsulated in a succession of protocol layers without ever having to be copied from a buffer at one layer of the protocol stack to an encapsulating buffer at a lower layer of the stack. For large source data objects, the savings in copy time and reduction in memory consumption may be considerable.
A clinical protocol to increase chewing and assess mastication in children with feeding disorders.
Volkert, Valerie M; Peterson, Kathryn M; Zeleny, Jason R; Piazza, Cathleen C
2014-09-01
Children with feeding disorders often cannot or do not chew when presented with table food. Children with chewing deficits also often swallow the bite before masticating it appropriately, which we will refer to as early swallowing. In the current study, we evaluated a clinical protocol to increase chews per bite, assess mastication, and eliminate early swallowing with three children with feeding disorders. The current study adds to a small body of literature on chewing and mastication of children with feeding disorders. Suggestions for future research are also discussed. © The Author(s) 2014.
Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)
2015-12-08
ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal
48 CFR 252.232-7006 - Wide Area WorkFlow Payment Instructions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... submission. Document submissions may be via Web entry, Electronic Data Interchange, or File Transfer Protocol... acceptance locations or “Not applicable.”) (3) Document routing. The Contractor shall use the information in the Routing Data Table below only to fill in applicable fields in WAWF when creating payment requests...
Slushie World: An In-Class Access Database Tutorial
ERIC Educational Resources Information Center
Wynn, Donald E., Jr.; Pratt, Renée M. E.
2015-01-01
The Slushie World case study is designed to teach the basics of Microsoft Access and database management over a series of three 75-minute class sessions. Students are asked to build a basic database to track sales and inventory for a small business. Skills to be learned include table creation, data entry and importing, form and report design,…
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
Direct access inter-process shared memory
Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B
2013-10-22
A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.
Guidelines for Outsourcing Remote Access.
ERIC Educational Resources Information Center
Hassler, Ardoth; Neuman, Michael
1996-01-01
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
Ahlin, Catharina; Klang-Söderkvist, Birgitta; Brundin, Seija; Hellström, Birgitta; Pettersson, Karin; Johansson, Eva
2006-01-01
The objectives of this study were to evaluate registered nurses' (RN) compliance with a local clinical central venous access device (CVAD) protocol after completing an educational program and to determine RNs' perception of the program. Seventy-five RNs working in hematology participated in the educational part of the program. Sixty-eight RNs were examined while changing CVAD dressings or placing a Huber needle into a port on actual patients. Sixty percent of the RNs passed the examination and reported that the program increased their knowledge. The results indicated that the educational program could be recommended for use when implementing a new clinical protocol.
A Cost Prediction Model for Electronic Systems Flight Test Costs.
1983-09-01
development. It was found that a significant cost estimating relationship (CER) exists between costs and the characteristics of the flight test design. Using...University In Partial Fulfillment of the Requirements for the Degree of Master of Science in Systems Management By C ., Thomas 3. DuPre’, BS Accession...SYSTEMS MANAGEMENT DATE: 28 September 1983 COMMITTEE CHA. ICEAfER it TABLE OF CONTENTS Page LIST OF TABLES ......................... vi LIST OF FIGURES
An Approach to Measuring a System’s Attack Surface
2007-08-01
0.437 p = 0.177 ActiveX 1.522 0.480 p = 0.002 WMF 46.314 2.58e+09 p = 1.000 Doc -1.123 0.462 p = 0.015 Access Rights -0.310 0.078 p < 0.001 Table 14...results in Table 14. The p-values show that HTML, ActiveX , and Doc are significant and DHTML and WMF are insignificant in explaining the severity rating
ERIC Educational Resources Information Center
Parameshwaran, Meenakshi; Thomson, Dave
2015-01-01
The Conservative-Liberal Democrat Coalition Government's reforms to secondary school Performance Tables have changed how schools make decisions about the subjects and qualifications entered by their pupils. The National Pupil Database is used to explore these changes between 2005 and 2014. We find that schools are responding to accountability…
X-Ray Attenuation and Absorption for Materials of Dosimetric Interest
National Institute of Standards and Technology Data Gateway
SRD 126 X-Ray Attenuation and Absorption for Materials of Dosimetric Interest (Web, free access) Tables and graphs of the photon mass attenuation coefficient and the mass energy-absorption coefficient are presented for all of the elements Z = 1 to 92, and for 48 compounds and mixtures of radiological interest. The tables cover energies of the photon (x-ray, gamma ray, bremsstrahlung) from 1 keV to 20 MeV.
[Construction of chemical information database based on optical structure recognition technique].
Lv, C Y; Li, M N; Zhang, L R; Liu, Z M
2018-04-18
To create a protocol that could be used to construct chemical information database from scientific literature quickly and automatically. Scientific literature, patents and technical reports from different chemical disciplines were collected and stored in PDF format as fundamental datasets. Chemical structures were transformed from published documents and images to machine-readable data by using the name conversion technology and optical structure recognition tool CLiDE. In the process of molecular structure information extraction, Markush structures were enumerated into well-defined monomer molecules by means of QueryTools in molecule editor ChemDraw. Document management software EndNote X8 was applied to acquire bibliographical references involving title, author, journal and year of publication. Text mining toolkit ChemDataExtractor was adopted to retrieve information that could be used to populate structured chemical database from figures, tables, and textual paragraphs. After this step, detailed manual revision and annotation were conducted in order to ensure the accuracy and completeness of the data. In addition to the literature data, computing simulation platform Pipeline Pilot 7.5 was utilized to calculate the physical and chemical properties and predict molecular attributes. Furthermore, open database ChEMBL was linked to fetch known bioactivities, such as indications and targets. After information extraction and data expansion, five separate metadata files were generated, including molecular structure data file, molecular information, bibliographical references, predictable attributes and known bioactivities. Canonical simplified molecular input line entry specification as primary key, metadata files were associated through common key nodes including molecular number and PDF number to construct an integrated chemical information database. A reasonable construction protocol of chemical information database was created successfully. A total of 174 research articles and 25 reviews published in Marine Drugs from January 2015 to June 2016 collected as essential data source, and an elementary marine natural product database named PKU-MNPD was built in accordance with this protocol, which contained 3 262 molecules and 19 821 records. This data aggregation protocol is of great help for the chemical information database construction in accuracy, comprehensiveness and efficiency based on original documents. The structured chemical information database can facilitate the access to medical intelligence and accelerate the transformation of scientific research achievements.
NASA Astrophysics Data System (ADS)
Brumana, R.; Santana Quintero, M.; Barazzetti, L.; Previtali, M.; Banfi, F.; Oreni, D.; Roels, D.; Roncoroni, F.
2015-08-01
Landscapes are dynamic entities, stretching and transforming across space and time, and need to be safeguarded as living places for the future, with interaction of human, social and economic dimensions. To have a comprehensive landscape evaluation several open data are needed, each one characterized by its own protocol, service interface, limiting or impeding this way interoperability and their integration. Indeed, nowadays the development of websites targeted to landscape assessment and touristic purposes requires many resources in terms of time, cost and IT skills to be implemented at different scales. For this reason these applications are limited to few cases mainly focusing on worldwide known touristic sites. The capability to spread the development of web-based multimedia virtual museum based on geospatial data relies for the future being on the possibility to discover the needed geo-spatial data through a single point of access in an homogenous way. In this paper the proposed innovative approach may facilitate the access to open data in a homogeneous way by means of specific components (the brokers) performing interoperability actions required to interconnect heterogeneous data sources. In the specific case study here analysed it has been implemented an interface to migrate a geo-swat chart based on local and regional geographic information into an user friendly Google Earth©-based infrastructure, integrating ancient cadastres and modern cartography, accessible by professionals and tourists via web and also via portable devices like tables and smartphones. The general aim of this work on the case study on the Lake of Como (Tremezzina municipality), is to boost the integration of assessment methodologies with digital geo-based technologies of map correlation for the multimedia ecomuseum system accessible via web. The developed WebGIS system integrates multi-scale and multi-temporal maps with different information (cultural, historical, landscape levels) represented by thematic icons allowing to transfer the richness of the landscape value to both tourists and professionals.
HECLIB. Volume 2: HECDSS Subroutines Programmer’s Manual
1991-05-01
algorithm and hierarchical design for database accesses. This algorithm provides quick access to data sets and an efficient means of adding new data set...Description of How DSS Works DSS version 6 utilizes a modified hash algorithm based upon the pathname to store and retrieve data. This structure allows...balancing disk space and record access times. A variation in this algorithm is for "stable" files. In a stable file, a hash table is not utilized
The role of chiropractic adjusting tables as reservoirs for microbial diseases.
Bifero, Antonio E; Prakash, Jaya; Bergin, Jeff
2006-04-01
Our goal was to enumerate the microbial flora on the headrest, armrest, and thoracic portion of chiropractic adjusting tables to determine the presence of pathogenic microorganisms and identify the potential for nosocomial transmission. Defined portions of the headrest, armrest, and thoracoabdominal pieces from 9 chiropractic adjusting tables were randomly sampled using the ACT II culture transport system (Remel, Lenexa, KS). Samples were incubated using standard culture techniques for bacteriology and mycology that included 15 mL of heart infusion agar at 35 degrees C for 24 hours and 15 mL of Sabouraud dextrose agar at 30 degrees C up to 7 days. Identification of microorganisms by biochemical analysis yielded a wide variety of gram-positive (G+) and gram-negative (G-) cocci and bacilli as well as standard fungi. Many were of the genus Staphylococcus. Methicillin-resistant S. aureus (MRSA) isolates were recovered from 2 separate tables. This study supports a growing consensus that those outpatient facilities that do not adhere to strict infection control protocols may become ecological reservoirs of potentially harmful human pathogens.
NASA Astrophysics Data System (ADS)
Indrayana, I. N. E.; P, N. M. Wirasyanti D.; Sudiartha, I. KG
2018-01-01
Mobile application allow many users to access data from the application without being limited to space, space and time. Over time the data population of this application will increase. Data access time will cause problems if the data record has reached tens of thousands to millions of records.The objective of this research is to maintain the performance of data execution for large data records. One effort to maintain data access time performance is to apply query optimization method. The optimization used in this research is query heuristic optimization method. The built application is a mobile-based financial application using MySQL database with stored procedure therein. This application is used by more than one business entity in one database, thus enabling rapid data growth. In this stored procedure there is an optimized query using heuristic method. Query optimization is performed on a “Select” query that involves more than one table with multiple clausa. Evaluation is done by calculating the average access time using optimized and unoptimized queries. Access time calculation is also performed on the increase of population data in the database. The evaluation results shown the time of data execution with query heuristic optimization relatively faster than data execution time without using query optimization.
ERDDAP - An Easier Way for Diverse Clients to Access Scientific Data From Diverse Sources
NASA Astrophysics Data System (ADS)
Mendelssohn, R.; Simons, R. A.
2008-12-01
ERDDAP is a new open-source, web-based service that aggregates data from other web services: OPeNDAP grid servers (THREDDS), OPeNDAP sequence servers (Dapper), NOS SOAP service, SOS (IOOS, OOStethys), microWFS, DiGIR (OBIS, BMDE). Regardless of the data source, ERDDAP makes all datasets available to clients via standard (and enhanced) DAP requests and makes some datasets accessible via WMS. A client's request also specifies the desired format for the results, e.g., .asc, .csv, .das, .dds, .dods, htmlTable, XHTML, .mat, netCDF, .kml, .png, or .pdf (formats more directly useful to clients). ERDDAP interprets a client request, requests the data from the data source (in the appropriate way), reformats the data source's response, and sends the result to the client. Thus ERDDAP makes data from diverse sources available to diverse clients via standardized interfaces. Clients don't have to install libraries to get data from ERDDAP because ERDDAP is RESTful and resource-oriented: a URL completely defines a data request and the URL can be used in any application that can send a URL and receive a file. This also makes it easy to use ERDDAP in mashups with other web services. ERDDAP could be extended to support other protocols. ERDDAP's hub and spoke architecture simplifies adding support for new types of data sources and new types of clients. ERDDAP includes metadata management support, catalog services, and services to make graphs and maps.
Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks
NASA Astrophysics Data System (ADS)
Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.
1996-12-01
In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.
The deployment of a large scale object store at the RAL Tier-1
NASA Astrophysics Data System (ADS)
Dewhurst, A.; Johnson, I.; Adams, J.; Canning, B.; Vasilakakos, G.; Packer, A.
2017-10-01
Since 2014, the RAL Tier-1 has been working on deploying a Ceph backed object store. The aim is to replace Castor for disk-only storage. This new service must be scalable to meet the data demands of the LHC to 2020 and beyond. As well as offering access protocols the LHC experiments currently use, it must also provide industry standard access protocols. In order to keep costs down the service must use erasure coding rather than replication to ensure data reliability. This paper will present details of the storage service setup, which has been named Echo, as well as the experience gained from running it. The RAL Tier-1 has also been developing XrootD and GridFTP plugins for Ceph. Both plugins are built on top of the same libraries that write striped data into Ceph and therefore data written by one protocol will be accessible by the other. In the long term we hope the LHC experiments will migrate to industry standard protocols, therefore these plugins will only provide the features needed by the LHC experiments. This paper will report on the development and testing of these plugins.
Increasing the Accessibility of Science for All Students
ERIC Educational Resources Information Center
Langley-Turnbaugh, S. J.; Wilson, G.; Lovewell, L.
2009-01-01
This paper evaluates the accessibility of selected field and laboratory high school science activities, and provides suggestions for increasing accessibility for students with disabilities. We focused on GLOBE (Global Learning Observations to Benefit the Environment) protocols, specifically the new Seasons and Biomes investigation currently being…
Traffic placement policies for a multi-band network
NASA Technical Reports Server (NTRS)
Maly, Kurt J.; Foudriat, E. C.; Game, David; Mukkamala, R.; Overstreet, C. Michael
1990-01-01
Recently protocols were introduced that enable the integration of synchronous traffic (voice or video) and asynchronous traffic (data) and extend the size of local area networks without loss in speed or capacity. One of these is DRAMA, a multiband protocol based on broadband technology. It provides dynamic allocation of bandwidth among clusters of nodes in the total network. A number of traffic placement policies for such networks are proposed and evaluated. Metrics used for performance evaluation include average network access delay, degree of fairness of access among the nodes, and network throughput. The feasibility of the DRAMA protocol is established through simulation studies. DRAMA provides effective integration of synchronous and asychronous traffic due to its ability to separate traffic types. Under the suggested traffic placement policies, the DRAMA protocol is shown to handle diverse loads, mixes of traffic types, and numbers of nodes, as well as modifications to the network structure and momentary traffic overloads.
A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks
Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang
2015-01-01
Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596
Kasenda, Benjamin; von Elm, Erik; You, John J; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias
2016-06-01
Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol.
A clinical data repository enhances hospital infection control.
Samore, M.; Lichtenberg, D.; Saubermann, L.; Kawachi, C.; Carmeli, Y.
1997-01-01
We describe the benefits of a relational database of hospital clinical data (Clinical Data Repository; CDR) for an infection control program. The CDR consists of > 40 Sybase tables, and is directly accessible for ad hoc queries by members of the infection control unit who have been granted privileges for access by the Information Systems Department. The data elements and functional requirements most useful for surveillance of nosocomial infections, antibiotic use, and resistant organisms are characterized. Specific applications of the CDR are presented, including the use of automated definitions of nosocomial infection, graphical monitoring of resistant organisms with quality control limits, and prospective detection of inappropriate antibiotic use. Hospital surveillance and quality improvement activities are significantly benefited by the availability of a querable set of tables containing diverse clinical data. PMID:9357588
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
The Wireless Data Acquisition System for the Vibration Table
NASA Astrophysics Data System (ADS)
Teng, Y. T.; Hu, X.
2014-12-01
The vibration table is a large-scaled tool used for inspecting the performance of seismometers. The output from a seismometer on the table can be directly monitored when the vibration table moves in certain pattern. Compared with other inspection methods, inspecting seismometers' performance indicators (frequency response, degree of linearity, sensitivity, lateral inhibition and dynamic range etc). using vibration tables is more intuitive. Therefore, the vibration tables are an essential testing part in developing new seismometers and seismometer quality control. Whereas, in practice, a cable is needed to connect the seismometer to the ground equipments for its signal outputs and power supply, that means adding a time-varying nonlinear spring between the vibration table and ground. The cable adds nonlinear feature to the table, distorts the table-board movement and bring extra errors to the inspecting work and affected the testing accuracy and precision. In face of this problem, we developed a wireless acquiring system for the vibration table. The system is consisted of a three-channel analog-to-digital conversion, an acquisition control part, local data storage, network interface, wireless router and power management, etc. The analog-to-digital conversion part uses a 24-digit high-precision converter, which has a programmable amplifier at the front end of its artificial circuit, with the function of matching outputs with different amplifier from the vibration table. The acquisition control part uses a 32 bit ARM processor, with low-power dissipation, minute extension and high performance. The application software platform is written in Linux to make the system convenient for multitasking work. Large volume local digital storage is achieved by a 32G SD card, which is used for saving real time acquired data. Data transmission is achieved by network interface and wireless router, which can simplify the application software by the supported TCP/IP protocol. Besides, the acquisition system uses built-in power supply, which provides power to the system with Li-On rechargeable battery with high capacity, then all the cable link between the vibration table and the ground equipment have been removed. With all these changes, the whole system is immobilized on board of the vibration table after being packaged.
Maintenance of Certification in dermatology: requirements for diplomates.
Stratman, Erik; Kirsner, Robert S; Horn, Thomas D
2013-07-01
Since 2006, after completing a cognitive certifying or recertifying examination, dermatologists are automatically enrolled into Maintenance of Certification (MOC) and can access a personalized electronic table (at www.abderm.org) that presents the requirements over the 10-year cycle. On this web site, diplomates can also pay the annual fee and attest to completion of the various components. Clicking on hyperlinks in the table launches explanations of the requirements. A hyperlink below the table takes the reader to the various resources approved for completion of the MOC requirements. There is a login tab in the upper left corner with a login help feature below. Clicking on the MOC tab will bring up the table. The timeline is specific to the individual. Copyright © 2013 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.
A Survey of Internet Use by Teachers in Three Urban Connecticut Schools.
ERIC Educational Resources Information Center
Hack, Lisa; Smey, Sue
1997-01-01
This study focused on two elementary schools and a high school in urban Connecticut to determine the number of teachers who had Internet access at home, and their proficiency and frequency of Internet use; levels of Internet access in the schools; integration of Internet into the curriculum; and possible future Internet use. Contains 6 tables.…
The Effect of Executive Order 13269 on Noncitizen Enlisted Accessions in the U.S. Military
2013-03-01
heteroscedasticity by using both White and Breusch - Pagan Tests (Woolridge, 2009). The test results showed that there was significant heteroscedasticy in...39 C. JOINT-HYPOTHESIS TEST AND SIGNIFICANCE OF THE MODELS...Accessions Regression Results ........................... 40 Table 8. The Authors’ R Square and F Test Results of DMDC Data ................ 42 xii
ERIC Educational Resources Information Center
Klein, Gary M.
1994-01-01
Online public access catalogs from 67 libraries using NOTIS software were searched using Internet connections to determine the positional operators selected as the default keyword operator on each catalog. Results indicate the lack of a processing standard for keyword searches. Five tables provide information. (Author/AEF)
SciELO, Scientific Electronic Library Online, a Database of Open Access Journals
ERIC Educational Resources Information Center
Meneghini, Rogerio
2013-01-01
This essay discusses SciELO, a scientific journal database operating in 14 countries. It covers over 1000 journals providing open access to full text and table sets of scientometrics data. In Brazil it is responsible for a collection of nearly 300 journals, selected along 15 years as the best Brazilian periodicals in natural and social sciences.…
Using Internet Audio to Enhance Online Accessibility
ERIC Educational Resources Information Center
Schwartz, Linda Matula
2004-01-01
Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…
Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara
2018-02-07
Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.
78 FR 55062 - Western Pacific Fishery Management Council; Public Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... Planning iv. Essential Fish Habitat v. Traditional/Indigenous Fishing 8. Round-table discussion on non... the emergency. Special Accommodations These meetings are physically accessible to people with...
A Framework for Network Visualisation (Un Cadre Pour la Visualisation des Reseaux)
2010-02-01
Business, Communities, and Government” (online), http://www.orgnet.com/inflow3.html (Access Date: 13 June 2008). [32] Batagelj , V., Mrvar , A. and...and NATO Workshops 1996 – 2008 1-7 Table 2-1 Perceptual Modes and Probable Display and Interaction Consequences 2-18 Table 2-2 Informational...RSG) was created in 1996 with the aim of developing methods for presenting to human users the implications of the contents of large, complex and
DOT National Transportation Integrated Search
2017-01-01
This report summarizes the local calibration of the distress models for the Northeast (NE) region of the United States and the development of new design tables for new flexible pavement structures. Design, performance, and traffic data collected on t...
Relationship Factors Contributing to the Progression of Combat Related PTSD and Suiciality Over Time
2015-04-01
6 Table 1. Hiring and orientation of project staff, purchasing and installing equipment...continues to refine and maintain detailed protocols for data checking and downloading, and ethics training for all study personnel (e.g., general...human subjects certification, documented agreement to specific ethical practices regarding this study). Five University of Colorado Institutional Review
Boehm, Markus; Wu, Tong-Ying; Claussen, Holger; Lemmen, Christian
2008-04-24
Large collections of combinatorial libraries are an integral element in today's pharmaceutical industry. It is of great interest to perform similarity searches against all virtual compounds that are synthetically accessible by any such library. Here we describe the successful application of a new software tool CoLibri on 358 combinatorial libraries based on validated reaction protocols to create a single chemistry space containing over 10 (12) possible products. Similarity searching with FTrees-FS allows the systematic exploration of this space without the need to enumerate all product structures. The search result is a set of virtual hits which are synthetically accessible by one or more of the existing reaction protocols. Grouping these virtual hits by their synthetic protocols allows the rapid design and synthesis of multiple follow-up libraries. Such library ideas support hit-to-lead design efforts for tasks like follow-up from high-throughput screening hits or scaffold hopping from one hit to another attractive series.
Geospatial Brokering - Challenges and Future Directions
NASA Astrophysics Data System (ADS)
White, C. E.
2012-12-01
An important feature of many brokers is to facilitate straightforward human access to scientific data while maintaining programmatic access to it for system solutions. Standards-based protocols are critical for this, and there are a number of protocols to choose from. In this discussion, we will present a web application solution that leverages certain protocols - e.g., OGC CSW, REST, and OpenSearch - to provide programmatic as well as human access to geospatial resources. We will also discuss managing resources to reduce duplication yet increase discoverability, federated search solutions, and architectures that combine human-friendly interfaces with powerful underlying data management. The changing requirements witnessed in brokering solutions over time, our recent experience participating in the EarthCube brokering hack-a-thon, and evolving interoperability standards provide insight to future technological and philosophical directions planned for geospatial broker solutions. There has been much change over the past decade, but with the unprecedented data collaboration of recent years, in many ways the challenges and opportunities are just beginning.
Tufariello, Maria; Durante, Miriana; Ramires, Francesca A.; Grieco, Francesco; Tommasi, Luca; Perbellini, Ezio; Falco, Vittorio; Tasioula-Margari, Maria; Logrieco, Antonio F.; Mita, Giovanni; Bleve, Gianluca
2015-01-01
Table olives represent one important fermented product in Europe and, in the world, their demand is constantly increasing. At the present time, no systems are available to control black table olives spontaneous fermentation by the Greek method. During this study, a new protocol for the production of black table olives belonging to two Italian (Cellina di Nardò and Leccino) and two Greek (Kalamàta and Conservolea) cultivars has been developed: for each table olive cultivar, starter-driven fermentations were performed inoculating, firstly, one selected autochthonous yeast starter and, subsequently, one selected autochthonous LAB starter. All starters formulation were able to dominate fermentation process. The olive fermentation was monitored using specific chemical descriptors able to identify a first stage (30 days) mainly characterized by aldehydes; a second period (60 days) mainly characterized by higher alcohols, styrene and terpenes; a third fermentation stage represented by acetate esters, esters and acids. A significant decrease of fermentation time (from 8 to 12 months to a maximum of 3 months) and an significant improvement in organoleptic characteristics of the final product were obtained. This study, for the first time, describes the employment of selected autochthonous microbial resources optimized to mimic the microbial evolution already recorded during spontaneous fermentations. PMID:26441932
Calvert, Melanie; Kyte, Derek; Duffy, Helen; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; Ives, Jonathan; Draper, Heather; Brundage, Michael; Blazeby, Jane; King, Madeleine
2014-01-01
Background Evidence suggests there are inconsistencies in patient-reported outcome (PRO) assessment and reporting in clinical trials, which may limit the use of these data to inform patient care. For trials with a PRO endpoint, routine inclusion of key PRO information in the protocol may help improve trial conduct and the reporting and appraisal of PRO results; however, it is currently unclear exactly what PRO-specific information should be included. The aim of this review was to summarize the current PRO-specific guidance for clinical trial protocol developers. Methods and Findings We searched the MEDLINE, EMBASE, CINHAL and Cochrane Library databases (inception to February 2013) for PRO-specific guidance regarding trial protocol development. Further guidance documents were identified via Google, Google scholar, requests to members of the UK Clinical Research Collaboration registered clinical trials units and international experts. Two independent investigators undertook title/abstract screening, full text review and data extraction, with a third involved in the event of disagreement. 21,175 citations were screened and 54 met the inclusion criteria. Guidance documents were difficult to access: electronic database searches identified just 8 documents, with the remaining 46 sourced elsewhere (5 from citation tracking, 27 from hand searching, 7 from the grey literature review and 7 from experts). 162 unique PRO-specific protocol recommendations were extracted from included documents. A further 10 PRO recommendations were identified relating to supporting trial documentation. Only 5/162 (3%) recommendations appeared in ≥50% of guidance documents reviewed, indicating a lack of consistency. Conclusions PRO-specific protocol guidelines were difficult to access, lacked consistency and may be challenging to implement in practice. There is a need to develop easily accessible consensus-driven PRO protocol guidance. Guidance should be aimed at ensuring key PRO information is routinely included in appropriate trial protocols, in order to facilitate rigorous collection/reporting of PRO data, to effectively inform patient care. PMID:25333995
Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.
Alam, Muhammad Mahtab; Ben Hamida, Elyes
2015-09-01
Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.
ERIC Educational Resources Information Center
Nieuwenhuysen, Paul
1997-01-01
Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
A new barrier-free burn center.
Edlich, R F; Neal, J G; Suber, F; Kirby, D; Woods, J A; Bentram, D; McGawen, J
1998-01-01
This article describes a barrier-free burn center that is accessible to persons with disabilities and that complies with Title III of the Americans with Disabilities Act. The burn center has 3 separate components: patient rooms, patient support facilities, and staff support facilities. Thirteen rooms are used to care for 16 patients. Two of the 13 rooms are accessible to people with disabilities. These 2 rooms have wide doors that permit a wheelchair to pass through, and they have enough clear floor space for a wheelchair to make a 180 degrees turn. The rooms have a sink that is accessible from a wheelchair. The bathrooms have large, clear floor spaces that allow for the turning of a wheelchair, elevated toilets, grab bars, and showers that permit wheelchair access. Special wheelchairs that provide easier shower and commode access are available. The patient support services feature a large hydrotherapy room that contains a table-shower system that allows a person in a wheelchair to gain access to both sides of the shower table. A tub room has been constructed to provide compact patient bathing and hydromassage, and it is also accessible to people in wheelchairs. The staff support services include a locker room that has a shower accessible to people with disabilities so that staff members with mobility disorders can work in the burn center. Grade II braille writing marks all of the signs that designate the permanent rooms and spacing in the burn center and in the contiguous common use areas. The common use area has a restroom accessible to people with disabilities and a waiting room with a telephone communications system for people with mobility disorders or mobility impairment.
Cavernous Angioma and Children
... of activity restrictions. The following table lists the comparative risks of activities for children with epilepsy and ... have access to one, can help you to design a program that could work for your child. ...
Calorie count - Alcoholic beverages
... nih.gov/pubmed/23384768 . United States Department of Agriculture website. National Nutrient Database for Standard Reference. ndb. ... 2018. Accessed April 12, 2018. US Department of Agriculture website. Nutrition and your health: Table E-3. ...
43 CFR 8360.0-5 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
...; potable water; grills or fire rings; tables; or controlled access. (d) Public lands means any lands and... controlled fire occurring out of doors, used for cooking, branding, personal warmth, lighting, ceremonial or...
43 CFR 8360.0-5 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
...; potable water; grills or fire rings; tables; or controlled access. (d) Public lands means any lands and... controlled fire occurring out of doors, used for cooking, branding, personal warmth, lighting, ceremonial or...
43 CFR 8360.0-5 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
...; potable water; grills or fire rings; tables; or controlled access. (d) Public lands means any lands and... controlled fire occurring out of doors, used for cooking, branding, personal warmth, lighting, ceremonial or...
43 CFR 8360.0-5 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
...; potable water; grills or fire rings; tables; or controlled access. (d) Public lands means any lands and... controlled fire occurring out of doors, used for cooking, branding, personal warmth, lighting, ceremonial or...
21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...
SU-F-P-31: Dosimetric Effects of Roll and Pitch Corrections Using Robotic Table
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mamalui, M; Su, Z; Flampouri, S
Purpose: To quantify the dosimetric effect of roll and pitch corrections being performed by two types of robotic tables available at our institution: BrainLabTM 5DOF robotic table installed at VERO (BrainLab&MHI) dedicated SBRT linear accelerator and 6DOF robotic couch by IBA Proton Therapy with QFixTM couch top. Methods: Planning study used a thorax phantom (CIRSTM), scanned at 4DCT protocol; targets (IGTV, PTV) were determined according to the institutional lung site-specific standards. 12 CT sets were generated with Pitch and Roll angles ranging from −4 to +4 degrees each. 2 table tops were placed onto the scans according to the modality-specificmore » patient treatment workflows. The pitched/rolled CT sets were fused to the original CT scan and the verification treatment plans were generated (12 photon SBRT plans and 12 proton conventional fractionation lung plans). Then the CT sets were fused again to simulate the effect of patient roll/pitch corrections by the robotic table. DVH sets were evaluated for all cases. Results: The effect of not correcting the phantom position for roll/pitch in photon SBRT cases was reducing the target coverage by 2% as maximum; correcting the positional errors by robotic table varied the target coverage within 0.7%. in case of proton treatment, not correcting the phantom position led to the coverage loss up to 4%, applying the corrections using robotic table reduced the coverage variation to less than 2% for PTV and within 1% for IGTV. Conclusion: correcting the patient position by using robotic tables is highly preferable, despite the small dosimetric changes introduced by the devices.« less
OAS :: Secretariat for Strengthening Democracy (SSD)
Structure Our Locations Contact Us Access to Information Offices in the Member States Our History Logo Authorities Services Legal Protocol Topics A Access to Information Access to Rights Actions against Corruption Management Public Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and
The Many Faces of the Economic Bulletin Board.
ERIC Educational Resources Information Center
Boettcher, Jennifer
1996-01-01
The Economic Bulletin Board (EBB), a one-stop site for economic statistics and government-sponsored business information, can be accessed on the World Wide Web, gopher, telnet, file transfer protocol, dial-up, and fax. Each access method has advantages and disadvantages related to connections, pricing, depth of access, retrieval, and system…
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
1978-02-01
Category Diai2osis Occurrence Gastrointestinal Gastric Ulcer 15.4 Duodenal Ulcer 15.4 Peptic Ulcer 15.4 Gastritis 15.4 Gall Bladder 7.7 Other 30.7...session, subjects were given a cardiovascular evaluation. During each 3-h test session, the subjects perfor -med four different combinations of tasks of...related" disease. As shown in Table 1, the principal subcategories of that disease relate to ulceration of the stomach and duodenum. Ulcers have long
Cardiorespiratory fitness of a Brazilian regional sample distributed in different tables.
Belli, Karlyse Claudino; Callegaro, Carine C; Calegaro, Carine; Richter, Cleusa Maria; Klafke, Jonatas Zeni; Stein, Ricardo; Viecili, Paulo Ricardo Nazario
2012-09-01
Most classification tables of cardiorespiratory fitness (CRF) used in clinical practice are international and have not been validated for the Brazilian population. That can result in important discrepancies when that classification is extrapolated to our population. To assess the use of major CRF tables available in a Brazilian population sample of the Central High Plan of the state of Rio Grande do Sul (RS). This study assessed the retrospective data of 2,930 individuals, living in 36 cities of the Central High Plan of the state of RS, and considered the following: presence of risk factors for cardiovascular disease and estimated maximum oxygen consumption (VO2peak) values obtained through exercise test with Bruce protocol. To classify CRF, the individuals were distributed according to sex, inserted in their respective age groups in the Cooper, American Heart Association (AHA) and Universidade Federal de São Paulo (Unifesp) tables, and classified according to their VO2peak. Women had lower VO2peak values as compared with those of men (23.5 ± 8.5 vs. 31.7 ± 10.8 mL.kg-1.min-1, p < 0.001). Considering both sexes, VO2peak showed an inverse and moderate correlation with age (R = -0.48, p < 0.001). An important discrepancy in the CRF classification levels was observed between the tables, ranging from 49% (Cooper x AHA) to 75% (Unifesp x AHA). Our findings indicate important discrepancy in the CRF classification levels of the tables assessed. Future studies could assess whether international tables could be used for the Brazilian population and populations of different regions of Brazil.
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W
2004-04-01
We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.
Catalog Descriptions Using VOTable Files
NASA Astrophysics Data System (ADS)
Thompson, R.; Levay, K.; Kimball, T.; White, R.
2008-08-01
Additional information is frequently required to describe database table contents and make it understandable to users. For this reason, the Multimission Archive at Space Telescope (MAST) creates Òdescription filesÓ for each table/catalog. After trying various XML and CSV formats, we finally chose VOTable. These files are easy to update via an HTML form, easily read using an XML parser such as (in our case) the PHP5 SimpleXML extension, and have found multiple uses in our data access/retrieval process.
QTLTableMiner++: semantic mining of QTL tables in scientific articles.
Singh, Gurnoor; Kuzniar, Arnold; van Mulligen, Erik M; Gavai, Anand; Bachem, Christian W; Visser, Richard G F; Finkers, Richard
2018-05-25
A quantitative trait locus (QTL) is a genomic region that correlates with a phenotype. Most of the experimental information about QTL mapping studies is described in tables of scientific publications. Traditional text mining techniques aim to extract information from unstructured text rather than from tables. We present QTLTableMiner ++ (QTM), a table mining tool that extracts and semantically annotates QTL information buried in (heterogeneous) tables of plant science literature. QTM is a command line tool written in the Java programming language. This tool takes scientific articles from the Europe PMC repository as input, extracts QTL tables using keyword matching and ontology-based concept identification. The tables are further normalized using rules derived from table properties such as captions, column headers and table footers. Furthermore, table columns are classified into three categories namely column descriptors, properties and values based on column headers and data types of cell entries. Abbreviations found in the tables are expanded using the Schwartz and Hearst algorithm. Finally, the content of QTL tables is semantically enriched with domain-specific ontologies (e.g. Crop Ontology, Plant Ontology and Trait Ontology) using the Apache Solr search platform and the results are stored in a relational database and a text file. The performance of the QTM tool was assessed by precision and recall based on the information retrieved from two manually annotated corpora of open access articles, i.e. QTL mapping studies in tomato (Solanum lycopersicum) and in potato (S. tuberosum). In summary, QTM detected QTL statements in tomato with 74.53% precision and 92.56% recall and in potato with 82.82% precision and 98.94% recall. QTM is a unique tool that aids in providing QTL information in machine-readable and semantically interoperable formats.
Distribution of Information in Ad Hoc Networks
2007-09-01
2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little
Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks
2012-02-28
SNR) are employed by many protocols and processes in direct-sequence ( DS ) spread-spectrum packet radio networks, including soft-decision decoding...adaptive modulation protocols, and power adjustment protocols. For DS spread spectrum, we have introduced and evaluated SNR estimators that employ...obtained during demodulation in a binary CDMA receiver. We investigated several methods to apply the proposed metric to the demodulator’s soft-decision
NASA Astrophysics Data System (ADS)
Watson, Clifton L.; Biswas, Subir
2014-06-01
With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.
McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C
2014-09-01
Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737
Jepsen, Steven M.; Koch, Joshua C.; Rose, Joshua R.; Voss, Clifford I.; Walvoord, Michelle Ann
2012-01-01
A series of ground-based observations were made between September 2010 and August 2011 near Twelvemile Lake, 19 kilometers southwest of Fort Yukon, Alaska, for use in ongoing hydrological analyses of watersheds in this region of discontinuous permafrost. Measurements include depth to ground ice, depth to water table, soil texture, soil moisture, soil temperature, and water pressure above the permafrost table. In the drained basin of subsiding Twelvemile Lake, we generally find an absence of newly formed permafrost and an undetectable slope of the water table; however, a sloping water table was observed in the low-lying channels extending into and away from the lake watershed. Datasets for these observations are summarized in this report and can be accessed by clicking on the links in each section or from the Downloads folder of the report Web page.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
User Procedures Standardization for Network Access. NBS Technical Note 799.
ERIC Educational Resources Information Center
Neumann, A. J.
User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…
Tools to Ease Your Internet Adventures: Part I.
ERIC Educational Resources Information Center
Descy, Don E.
1993-01-01
This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)
Code of Federal Regulations, 2010 CFR
2010-01-01
... may be conducted, on a selective basis, to verify the absence of undeclared nuclear material and nuclear related activities at reportable uranium hard-rock mines and ore beneficiation plants (see § 783.1... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS...
The European Southern Observatory-MIDAS table file system
NASA Technical Reports Server (NTRS)
Peron, M.; Grosbol, P.
1992-01-01
The new and substantially upgraded version of the Table File System in MIDAS is presented as a scientific database system. MIDAS applications for performing database operations on tables are discussed, for instance, the exchange of the data to and from the TFS, the selection of objects, the uncertainty joins across tables, and the graphical representation of data. This upgraded version of the TFS is a full implementation of the binary table extension of the FITS format; in addition, it also supports arrays of strings. Different storage strategies for optimal access of very large data sets are implemented and are addressed in detail. As a simple relational database, the TFS may be used for the management of personal data files. This opens the way to intelligent pipeline processing of large amounts of data. One of the key features of the Table File System is to provide also an extensive set of tools for the analysis of the final results of a reduction process. Column operations using standard and special mathematical functions as well as statistical distributions can be carried out; commands for linear regression and model fitting using nonlinear least square methods and user-defined functions are available. Finally, statistical tests of hypothesis and multivariate methods can also operate on tables.
NASA Astrophysics Data System (ADS)
Medjahdi, Yahia; Terré, Michel; Ruyet, Didier Le; Roviras, Daniel
2014-12-01
In this paper, we investigate the impact of timing asynchronism on the performance of multicarrier techniques in a spectrum coexistence context. Two multicarrier schemes are considered: cyclic prefix-based orthogonal frequency division multiplexing (CP-OFDM) with a rectangular pulse shape and filter bank-based multicarrier (FBMC) with physical layer for dynamic spectrum access and cognitive radio (PHYDYAS) and isotropic orthogonal transform algorithm (IOTA) waveforms. First, we present the general concept of the so-called power spectral density (PSD)-based interference tables which are commonly used for multicarrier interference characterization in spectrum sharing context. After highlighting the limits of this approach, we propose a new family of interference tables called `instantaneous interference tables'. The proposed tables give the interference power caused by a given interfering subcarrier on a victim one, not only as a function of the spectral distance separating both subcarriers but also with respect to the timing misalignment between the subcarrier holders. In contrast to the PSD-based interference tables, the accuracy of the proposed tables has been validated through different simulation results. Furthermore, due to the better frequency localization of both PHYDYAS and IOTA waveforms, FBMC technique is demonstrated to be more robust to timing asynchronism compared to OFDM one. Such a result makes FBMC a potential candidate for the physical layer of future cognitive radio systems.
Post Accident Procedures for Chemicals and Propellants.
1982-09-01
METHODS AND PROCEDURES ............ 4-1 4.1 Overview of Emergency Response Procedures " and Resources Available .......................... 4-1 L1 TABLE...7-1 7.1 Criteria forTwelve Critical Operations ........................ 7-1 7.1.1 On-Scene Methods for Identifying the Ingredients...Establishing A Protocol for Selecting the Hazards Mitigation and Cleanup Methods for Single Material Spills and Multiple Materials Mixing
An Interface Transformation Strategy for AF-IPPS
2012-12-01
Representational State Transfer (REST) and Java Enterprise Edition ( Java EE) to implement a reusable “translation service.” For SOAP and REST protocols, XML and...of best-of-breed open source software. The product baseline is summarized in the following table: Product Function Description Java Language...Compiler & Runtime JBoss Application Server Applications, Messaging, Translation Java EE Application Server Ruby on Rails Applications Ruby Web
Open-Source Data Collection Techniques for Weapons Transfer Information
2012-03-01
IR Infrared ISO International Organization for Standardization ITAR International Traffic in Arms Regulations NER Named Entity Recognition NLP ...Control Protocol UAE United Arab Emirates URI Uniform Resource Identifier URL Uniform Resource Locator USSR Union of Soviet Socialist Republics UTF...KOREA, DEMOCRATIC PEOPLE’S REPUBLIC OF North Korea KOREA, REPUBLIC OF South Korea LIBYAN ARAB JAMAHIRIYA Libya RUSSIAN FEDERATION Russia Table 3
Ambulatory obstetrical care: strategies to reduce telephone liability.
Phelan, J P
1998-09-01
The telephone will become the centerpiece of ambulatory care services. As such, a pertinent aspect of office procedures will necessarily include a protocol to manage and document telephone calls. Encourage your office staff to use good telephone manners, as listed in Table 5. The net result should be a reduction in telephone liability risks and an enhanced reputation for your office.
Kadlub, N; Chapuis Vandenbogaerde, C; Joly, A; Neiva, C; Vazquez, M-P; Picard, A
2018-04-01
Comparing functional outcomes after velar repair appeared to be difficult because of the absence of international standardized scale. Moreover most of the studies evaluating speech after cleft surgery present multiple biases. The aim of our study was to assess speech outcomes in a homogeneous group of patients, and to define an equivalence table between different speech scales. Patients with isolated cleft lip and palate (CLP), operated in our unit by the same senior surgeon were included. All patient were operated according to the same protocol (cheilo-rhinoplasty and intravelar veloplasty at 6 months, followed by a direct closure of the hard palate at 15 months). Speech evaluation was performed after 3 year-old and before the alveolar cleft repair. Borel-Maisonny scale and nasometry were used for speech evaluation. Twenty-four patients were included: 17 unilateral CLP and 7 bilateral CLP. According to the Borel-Maisonny classifications, 82.5% were ranged phonation 1, 1-2 or 2b. Nasometry were normal in almost 60% of cases. This study showed the efficiency of our protocol, and intravelar veloplasty. Moreover we proposed an equivalence table for speech evaluation scale. Copyright © 2017 Elsevier Masson SAS. All rights reserved.
Semiquantum key distribution with secure delegated quantum computation
Li, Qin; Chan, Wai Hong; Zhang, Shengyu
2016-01-01
Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384
Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent
NASA Technical Reports Server (NTRS)
Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.
2013-01-01
This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
A prototype of Virtual Observatory access for planetary data in the framework of Europlanet-RI/IDIS
NASA Astrophysics Data System (ADS)
Gangloff, M.; Cecconi, B.; Bourrel, N.; Jacquey, C.; Le Sidaner, P.; Berthier, J.; André, N.; Pallier, E.; Erard, S.; Aboudarham, J.; Chanteur, G. M.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.
2011-12-01
Europlanet RI is a four-year project supported by the European Union under the Seventh Framework Programme. Launched in January 2009, it is an Integrated Infrastructure Initiative, ie. A combination of Networking Activities, Transnational Access Activities and Joint Research Activities. The Networking Activities aim at further fostering a culture of cooperation in the field of Planetary Sciences. The objective of the Transnational Access Activities is to provide transnational access to a range of laboratory and field site facilities tailored to the needs of planetary research and on-line access to the available planetary science data, information and software tools, through the IDIS e-service. The overall aim of the Joint Research Activities (JRA) is to improve the services provided by the ensemble of Transnational Access Activities. In EuroPlaNet-RI, JRA4 must prepare essential tools for IDIS (Integrated and Distributed Information Service) allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. This is the first step towards a Planetary Virtual Observatory. The first requirement for different data centres to be able to operate together collectively is adequate standardization. In particular a common description of data and services is essential. This is why the major part of JRA4/Task2 activity is focussing on data models, associated dictionnaries, and protocols to exchange queries. A specific data model is being developed for IDIS, associated with the PDAP protocol, a standard defined by the IPDA (International Planetary Data Alliance) The scope of this prototype is to demonstrate the capabilities of the IDIS Data Model, and the PDAP protocol to search and retrieve data in the wide topical planetology context.
Recommendations for a service framework to access astronomical archives
NASA Technical Reports Server (NTRS)
Travisano, J. J.; Pollizzi, J.
1992-01-01
There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.
Internet Connections: Understanding Your Access Options.
ERIC Educational Resources Information Center
Notess, Greg R.
1994-01-01
Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…
This interactive website provides access to cancer statistics (rates and trends) for a cancer site by gender, race, calendar year, stage, and histology. Users can create custom graphs and tables, download data and images, download SEER*Stat sessions, and share results.
Hansmann, Jan; Michaely, Henrik J; Morelli, John N; Diehl, Steffen J; Meyer, Mathias; Schoenberg, Stefan O; Attenberger, Ulrike I
2013-12-01
The purpose of this article is to evaluate the added diagnostic accuracy of time-resolved MR angiography (MRA) of the calves compared with continuous-table-movement MRA in patients with symptomatic lower extremity peripheral artery disease (PAD) using digital subtraction angiography (DSA) correlation. Eighty-four consecutive patients with symptomatic PAD underwent a low-dose 3-T MRA protocol, consisting of continuous-table-movement MRA, acquired from the diaphragm to the calves, and an additional time-resolved MRA of the calves; 0.1 mmol/kg body weight (bw) of contrast material was used (0.07 mmol/kg bw for continuous-table-movement MRA and 0.03 mmol/kg bw for time-resolved MRA). Two radiologists rated image quality on a 4-point scale and stenosis degree on a 3-point scale. An additional assessment determined the degree of venous contamination and whether time-resolved MRA improved diagnostic confidence. The accuracy of stenosis gradation with continuous-table-movement and time-resolved MRA was compared with that of DSA as a correlation. Overall diagnostic accuracy was calculated for continuous-table-movement and time-resolved MRA. Median image quality was rated as good for 578 vessel segments with continuous-table-movement MRA and as excellent for 565 vessel segments with time-resolved MRA. Interreader agreement was excellent (κ = 0.80-0.84). Venous contamination interfered with diagnosis in more than 60% of continuous-table-movement MRA examinations. The degree of stenosis was assessed for 340 vessel segments. The diagnostic accuracies (continuous-table-movement MRA/time-resolved MRA) combined for the readers were obtained for the tibioperoneal trunk (84%/93%), anterior tibial (69%/87%), posterior tibial (85%/91%), and peroneal (67%/81%) arteries. The addition of time-resolved MRA improved diagnostic confidence in 69% of examinations. The addition of time-resolved MRA at the calf station improves diagnostic accuracy over continuous-table-movement MRA alone in symptomatic patients with PAD.
Data Model and Relational Database Design for Highway Runoff Water-Quality Metadata
Granato, Gregory E.; Tessler, Steven
2001-01-01
A National highway and urban runoff waterquality metadatabase was developed by the U.S. Geological Survey in cooperation with the Federal Highway Administration as part of the National Highway Runoff Water-Quality Data and Methodology Synthesis (NDAMS). The database was designed to catalog available literature and to document results of the synthesis in a format that would facilitate current and future research on highway and urban runoff. This report documents the design and implementation of the NDAMS relational database, which was designed to provide a catalog of available information and the results of an assessment of the available data. All the citations and the metadata collected during the review process are presented in a stratified metadatabase that contains citations for relevant publications, abstracts (or previa), and reportreview metadata for a sample of selected reports that document results of runoff quality investigations. The database is referred to as a metadatabase because it contains information about available data sets rather than a record of the original data. The database contains the metadata needed to evaluate and characterize how valid, current, complete, comparable, and technically defensible published and available information may be when evaluated for application to the different dataquality objectives as defined by decision makers. This database is a relational database, in that all information is ultimately linked to a given citation in the catalog of available reports. The main database file contains 86 tables consisting of 29 data tables, 11 association tables, and 46 domain tables. The data tables all link to a particular citation, and each data table is focused on one aspect of the information collected in the literature search and the evaluation of available information. This database is implemented in the Microsoft (MS) Access database software because it is widely used within and outside of government and is familiar to many existing and potential customers. The stratified metadatabase design for the NDAMS program is presented in the MS Access file DBDESIGN.mdb and documented with a data dictionary in the NDAMS_DD.mdb file recorded on the CD-ROM. The data dictionary file includes complete documentation of the table names, table descriptions, and information about each of the 419 fields in the database.
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
NASA Astrophysics Data System (ADS)
Firestone, Richard B.; Chu, S. Y. Frank; Ekstrom, L. Peter; Wu, Shiu-Chin; Singh, Balraj
1997-10-01
The Isotopes Project is developing Internet home pages to provide data for radioactive decay, nuclear structure, nuclear astrophysics, spontaneous fission, thermal neutron capture, and atomic masses. These home pages can be accessed from the Table of Isotopes home page at http://isotopes.lbl.gov/isotopes/toi.html. Data from the Evaluated Nuclear Structure Data File (ENSDF) is now available on the WWW in Nuclear Data Sheet style tables, complete with comments and hypertext linked footnotes. Bibliographic information from the Nuclear Science Reference (NSR) file can be searched on the WWW by combinations of author, A, Z, reaction, and various keywords. Decay gamma-ray data from several databases can be searched by energy. The Table of Superdeformed Nuclear Bands and Fission Isomers is continously updated. Reaction rates from Hoffman and Woosley and from Thielemann, fission yields from England and Rider, thermal neutron cross-sections from BNL-325, atomic masses from Audi, and skeleton scheme drawings and nuclear charts from the Table of Isotopes are among the information available through these websites. The nuclear data home pages are accessed by over 3500 different users each month.
Hildon, Zoe; Allwood, Dominique; Black, Nick
2012-02-01
Displays comparing the performance of healthcare providers are largely based on commonsense. To review the literature on the impact of compositional format and content of quantitative data displays on people's comprehension, choice and preference. Ovid databases, expert recommendations and snowballing techniques. Evaluations of the impact of different formats (bar charts, tables and pictographs) and content (ordering, explanatory visual cues, etc.) of quantitative data displays meeting defined quality criteria. Data extraction Type of decision; decision-making domains; audiences; formats; content; methodology; findings. Most of the 30 studies used quantitative (n= 26) methods with patients or public groups (n= 28) rather than with professionals (n= 2). Bar charts were the most frequent format, followed by pictographs and tables. As regards format, tables and pictographs appeared better understood than bar charts despite the latter being preferred. Although accessible to less numerate and older populations, pictographs tended to lead to more risk avoidance. Tables appeared accessible to all. Aspects of content enhancing the impact of data displays included giving visual explanatory cues and contextual information while still attempting simplicity ('less is more'); ordering data; consistency. Icons rather than numbers were more user-friendly but could lead to over-estimation of risk. Uncertainty was not widely understood, nor well represented. Though heterogeneous and limited in scope, there is sufficient research evidence to inform the presentation of quantitative data that compares the performance of healthcare providers. The impact of new formats, such as funnel plots, needs to be evaluated.
Informal payments in the Greek health sector amid the financial crisis: old habits die last...
Souliotis, Kyriakos; Golna, Christina; Tountas, Yannis; Siskou, Olga; Kaitelidou, Daphne; Liaropoulos, Lycourgos
2016-03-01
Under-the-table informal payments are commonplace as reimbursements for health care services in Greece. As the country faces a severe financial crisis, the need to investigate the extent of such payments, their incidence and their impact on household income is pressing. A survey of 2,741 persons from across the country was conducted between December 2011 and February 2012. The sample was defined via a multistage selection process using a quota for municipality of residence, sex and age. The maximum error margin was 2.41% with a confidence interval of 95%. The survey reports under-the-table payments for approximately 32.4% of public hospital admissions. Private clinics, which display the bulk of out-of-pocket payments, naturally display the lowest under-the-table payments. The highest percentage of under-the-table payments in the private sector appears at visits to private practitioners and dentists (36%). Informal payments are most frequently made upon request, prior to service provision, to facilitate access to care and to reduce waiting times, and at a much lower percentage, to post-service provision, and out of gratitude. This survey reveals that, due to severe financial pressure, there is a growing unwillingness of citizens to pay informally and an increasing demand for these payments as a prerequisite for access to services or to redeem services provided. This "hidden" financial burden of at least 27% impacts negatively on the living conditions of households and is not reported as purchasing ability or cost of living.
Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias
2016-01-01
Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol. PMID:27352244
Morelli, Luca; Palmeri, Matteo; Simoncini, Tommaso; Cela, Vito; Perutelli, Alessandra; Selli, Cesare; Buccianti, Piero; Francesca, Francesco; Cecchi, Massimo; Zirafa, Cristina; Bastiani, Luca; Cuschieri, Alfred; Melfi, Franca
2018-03-30
The da Vinci® Table Motion (dVTM) comprises a combination of a unique operating table (Trumpf Medical™ TruSystem® 7000dV) capable of isocenter motion connected wirelessly with the da Vinci Xi® robotic platform, thereby enabling patients to be repositioned without removal of instruments and or undocking the robot. Between May 2015 to October 2015, the first human use of dVTM was carried out in this prospective, single-arm, post-market study in the EU, for which 40 patients from general surgery (GS), urology (U), or gynecology (G) were enrolled prospectively. Primary endpoints of the study were dVTM feasibility, efficacy, and safety. Surgeons from the three specialties obtained targeting success and the required table positioning in all cases. Table movement/repositioning was necessary to gain exposure of the operating field in 106/116 table moves (91.3%), change target in 2/116 table moves (1.7%), achieve hemodynamic relief in 4/116 table moves (3.5%), and improve external access for tumor removal in 4/116 table moves (3.5%). There was a significantly higher use of tilt and tilt plus Trendelenburg in GS group (GS vs. U p = 0.055 and GS vs. G p = 0.054). There were no dVTM safety-related or adverse events. The dVTM with TruSystem 7000dV operating table in wireless communication with the da Vinci Xi is a perfectly safe and effective synergistic combination, which allows repositioning of the patient whenever needed without imposing any delay in the execution of the operation. Moreover, it is helpful in avoiding extreme positions and enables the anesthesiologist to provide immediate and effective hemodynamic relief to the patient when needed.
Beyond Tables, Templates, and Checklists: Logistical Art
2009-04-07
www.encyclopedia.com/doc/1E1-Clausewi.html; Internet ; accessed November 18, 2008. “Karl von Clausewitz, 1780-1831, Prussian general and military...1E1-Jomini-A.html; Internet ; accessed November 18, 2008. “Antoine Henri Jomini , 1779-1869, Swiss general and military writer. He organized (1799...1804-10; tr. Treatise on Grand Military Operations ); Histoire critique et militaire des guerres de la Révolution (1819-24), on the French
Resources, Equipment and Logistics in Support of Long-Term Monitoring at Fort Benning
2005-08-01
access to cell phone transceivers for data retrieval. Sensor manufacturers, state climatologists, and the EPA provide standards, guidelines...have cell phone access for data retrieval and any software driven maintenance. Figure 3. Typical meteorological data acquisition station Sensor...collect and store data every 30 minutes. Of three current stations, one has a cell phone data link for daily retrieval. Table 2 lists equipment
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J
2010-11-01
Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.
Prediction based Greedy Perimeter Stateless Routing Protocol for Vehicular Self-organizing Network
NASA Astrophysics Data System (ADS)
Wang, Chunlin; Fan, Quanrun; Chen, Xiaolin; Xu, Wanjin
2018-03-01
PGPSR (Prediction based Greedy Perimeter Stateless Routing) is based on and extended the GPSR protocol to adapt to the high speed mobility of the vehicle auto organization network (VANET) and the changes in the network topology. GPSR is used in the VANET network environment, the network loss rate and throughput are not ideal, even cannot work. Aiming at the problems of the GPSR, the proposed PGPSR routing protocol, it redefines the hello and query packet structure, in the structure of the new node speed and direction information, which received the next update before you can take advantage of its speed and direction to predict the position of node and new network topology, select the right the next hop routing and path. Secondly, the update of the outdated node information of the neighbor’s table is deleted in time. The simulation experiment shows the performance of PGPSR is better than that of GPSR.
An Educators' Guide to Information Access across the Internet.
ERIC Educational Resources Information Center
Hazari, Sunil
1994-01-01
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...
77 FR 6094 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
....-International Atomic Energy Agency Additional Protocol. Under the U.S.-International Atomic Energy Agency (IAEA...-related activities to the IAEA and potentially provide access to IAEA inspectors for verification purposes. The U.S.-IAEA Additional Protocol permits the United States unilaterally to declare exclusions from...
Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M
2009-01-01
Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.
ERIC Educational Resources Information Center
Chen, Ching-chih
1996-01-01
Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)
106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink
2017-07-31
Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit
National Water Quality Standards Database (NWQSD)
The National Water Quality Standards Database (WQSDB) provides access to EPA and state water quality standards (WQS) information in text, tables, and maps. This data source was last updated in December 2007 and will no longer be updated.
14 CFR Appendix B to Part 382 - Cross-Reference Table
Code of Federal Regulations, 2012 CFR
2012-01-01
... assistive devices, POCs and other respiratory assistive devices. 43(a) 129(b) Timely return of assistive...) 45 Availability of copy of rule. 47(a) 43 TTY's and reservations systems. 47(b) 69 Accessibility of...
14 CFR Appendix B to Part 382 - Cross-Reference Table
Code of Federal Regulations, 2013 CFR
2013-01-01
... assistive devices, POCs and other respiratory assistive devices. 43(a) 129(b) Timely return of assistive...) 45 Availability of copy of rule. 47(a) 43 TTY's and reservations systems. 47(b) 69 Accessibility of...
14 CFR Appendix B to Part 382 - Cross-Reference Table
Code of Federal Regulations, 2014 CFR
2014-01-01
... assistive devices, POCs and other respiratory assistive devices. 43(a) 129(b) Timely return of assistive...) 45 Availability of copy of rule. 47(a) 43 TTY's and reservations systems. 47(b) 69 Accessibility of...
Epidural Injections for Spinal Pain
... then be positioned on your stomach or side on a special fluoroscopic or CT table that will give the doctor easy access to the injection site(s). A nurse and/or technologist will help to make you as comfortable as ...
DOT National Transportation Integrated Search
2007-12-01
The current slim 100 page booklet can be accessed in PDF format from this introductory front page. It is just what the name suggests, a series of statistical snapshots, graphs and tables relating the status of the state demographics and the transport...
Easy Online Access to Helpful Internet Guides.
ERIC Educational Resources Information Center
Tuss, Joan
1993-01-01
Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)
An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
Multiple Access Schemes for Lunar Missions
NASA Technical Reports Server (NTRS)
Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.
2010-01-01
Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.
RosettaScripts: a scripting language interface to the Rosetta macromolecular modeling suite.
Fleishman, Sarel J; Leaver-Fay, Andrew; Corn, Jacob E; Strauch, Eva-Maria; Khare, Sagar D; Koga, Nobuyasu; Ashworth, Justin; Murphy, Paul; Richter, Florian; Lemmon, Gordon; Meiler, Jens; Baker, David
2011-01-01
Macromolecular modeling and design are increasingly useful in basic research, biotechnology, and teaching. However, the absence of a user-friendly modeling framework that provides access to a wide range of modeling capabilities is hampering the wider adoption of computational methods by non-experts. RosettaScripts is an XML-like language for specifying modeling tasks in the Rosetta framework. RosettaScripts provides access to protocol-level functionalities, such as rigid-body docking and sequence redesign, and allows fast testing and deployment of complex protocols without need for modifying or recompiling the underlying C++ code. We illustrate these capabilities with RosettaScripts protocols for the stabilization of proteins, the generation of computationally constrained libraries for experimental selection of higher-affinity binding proteins, loop remodeling, small-molecule ligand docking, design of ligand-binding proteins, and specificity redesign in DNA-binding proteins.
Taxonomies of Organizational Change: Literature Review and Analysis
1978-09-01
operational terms presented a sig- nificant problem. The redundancy and circularity in discussions of variable groups reflects this dilemma . -34...Behavioral event and structured inteview protocols to be used to collect data from internal Army OE change agent and client subjects are presented with a...TABLE 22: Data Collection Method Proposed for Each Intervention Variable 168 *1 ABSTRACT This report presents a taxonomy and data collection method
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, B; Yi, B; Eley, J
Purpose: To: (1) describe an independent, automated, systematic software-based protocol for verifying clinical data accuracy/integrity for mitigation of data corruption/loss risks following radiation oncology information system (ROIS) upgrades; and (2) report on application of this approach in an academic/community practice environment. Methods: We propose a robust approach to perform quality assurance on the ROIS after an upgrade, targeting four data sources: (1) ROIS relational database; (2) ROIS DICOM interface; (3) ROIS treatment machine data configuration; and (4) ROIS-generated clinical reports. We investigated the database schema for differences between pre-/post-upgrade states. Paired DICOM data streams for the same object (such asmore » RT-Plan/Treatment Record) were compared between pre-/post-upgrade states for data corruption. We examined machine configuration and related commissioning data files for changes and corruption. ROIS-generated treatment appointment and treatment parameter reports were compared to ensure patient encounter and treatment plan accuracy. This protocol was supplemented by an end-to-end clinical workflow test to verify essential ROI functionality and integrity of components interfaced during patient care chain of activities. We describe the implementation of this protocol during a Varian ARIA system upgrade at our clinic. Results: We verified 1,638 data tables with 2.4 billion data records. For 222 under-treatment patients, 605 DICOM RT plans and 13,480 DICOM treatment records retrieved from the ROIS DICOM interface were compared, with no differences in fractions, doses delivered, or treatment parameters. We identified 82 new data tables and 78 amended/deleted tables consistent with the upgrade. Reports for 5,073 patient encounters over a 2-week horizon were compared and were identical to those before the upgrade. Content in 12,237 xml machine files was compared, with no differences identified. Conclusion: An independent QA/validation approach for ROIS upgrades was developed and implemented at our clinic. The success of this approach ensures a robust QA of ROIS upgrades without manual paper/electronic checks and associated intensive labor.« less
Integrated AUTODIN System Architecture Report. Part 2.
1979-03-01
Link Modes Protocols and end-to- end host protocols Codes ASCII, ITA#2 ASCII, Others (Trans- parent to network) Speeds 45 thru 4800 bps 110 bps thru 56K ...service facilities such as AMPEs, subscriber access lines, modems , multiplexers, concentrators, interface development to include software design and...Protocol) CODES - ASCII and ITA#2 (others transparent) SPEEDS - 45.5bps - 56K bps FORMATS - AUTODIN II Segment Formats, JANAP 128, ACP 126/127, DOI 103
Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks
2007-01-01
Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR
The Historian and Electronic Research: File Transfer Protocol (FTP).
ERIC Educational Resources Information Center
McCarthy, Michael J.
1993-01-01
Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)
Migrating an Online Service to WAP - A Case Study.
ERIC Educational Resources Information Center
Klasen, Lars
2002-01-01
Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...
1987-09-01
University, the United States Air Force, or the Department of JDefense. Accession For NTIS GRA&I DTIC TAB Uliannouncedj u s t i f i c a t i o n...114 VI vi W,7% WN T "Vyn An r % List of Tables Table Page 1. ALCs Operation and Maintenance Costs ....... 53 2...CSCS deals strictly with aircraft com- ponents and subsystems that have been designated reparable, which means they are economical to repair. As part
USAFA/8086 - A State of the Art Microprocessor System. Volume II. Software Documentation.
1980-06-01
34 /* THE THREE FOLLOWING STRUCTU2RES APE NECESSARY TO MLLLO ThE OPERATING SYTEM TO HAVE INDIRECT ACCESS TL 41EMOP *. 13- ** _3_ -- - , -- K k"" , PijPL...FILLJ$ ERROR$ ONE IOPB CHECKER LINK$IN$ DIR$IN$ ABM $IN$ DATA$IN$ OUT OUT OUT OUT DisK86 MODUlE FiGuRE 8. DATA TRANSFER UTILITIE.S 62 In addition to...SUPPORT ROUTINES. Table 3 shows the functions of these routines. TABLE 3. SUPPORT PROCEDURES ROUTINE FUNCTION ABM $ZERO Makes a given sector on a
2011-09-01
process). Beyond this project, it will be useful to determine what access structures are meaningful and take the processing cost into account as well. In...14 Table 9 Costs incurred by various approaches...28 Table 10 Costs incurred by various approaches for Top K Plans
Astronomical Data Integration Beyond the Virtual Observatory
NASA Astrophysics Data System (ADS)
Lemson, G.; Laurino, O.
2015-09-01
"Data integration" generally refers to the process of combining data from different source data bases into a unified view. Much work has been devoted in this area by the International Virtual Observatory Alliance (IVOA), allowing users to discover and access databases through standard protocols. However, different archives present their data through their own schemas and users must still select, filter, and combine data for each archive individually. An important reason for this is that the creation of common data models that satisfy all sub-disciplines is fraught with difficulties. Furthermore it requires a substantial amount of work for data providers to present their data according to some standard representation. We will argue that existing standards allow us to build a data integration framework that works around these problems. The particular framework requires the implementation of the IVOA Table Access Protocol (TAP) only. It uses the newly developed VO data modelling language (VO-DML) specification, which allows one to define extensible object-oriented data models using a subset of UML concepts through a simple XML serialization language. A rich mapping language allows one to describe how instances of VO-DML data models are represented by the TAP service, bridging the possible mismatch between a local archive's schema and some agreed-upon representation of the astronomical domain. In this so called local-as-view approach to data integration, “mediators" use the mapping prescriptions to translate queries phrased in terms of the common schema to the underlying TAP service. This mapping language has a graphical representation, which we expose through a web based graphical “drag-and-drop-and-connect" interface. This service allows any user to map the holdings of any TAP service to the data model(s) of choice. The mappings are defined and stored outside of the data sources themselves, which allows the interface to be used in a kind of crowd-sourcing effort to annotate any remote database of interest. This reduces the burden of publishing one's data and allows a great flexibility in the definition of the views through which particular communities might wish to access remote archives. At the same time, the framework easies the user's effort to select, filter, and combine data from many different archives, so as to build knowledge bases for their analysis. We will present the framework and demonstrate a prototype implementation. We will discuss ideas for producing the missing elements, in particular the query language and the implementation of mediator tools to translate object queries to ADQL
Patel, Mitesh; Bagary, Manny; McCorry, Dougall
2015-01-01
Convulsive Status Epilepticus (CSE) is a common neurological emergency with patients presenting with prolonged epileptic activity. Sub-optimal management is coupled with high morbidity and mortality. Continuous electroencephalogram (EEG) monitoring is considered essential by the National Institute for Health and Care Excellence (NICE) in the management of Convulsive Refractory Status Epilepticus (CRSE). The aim of this research was to determine current clinical practice in the management of CRSE amongst adults in intensive care units (ICU) in the UK and establish if the use of a standardised protocol requires re-enforcement within trusts. 75 randomly selected UK NHS Trusts were contacted and asked to complete a questionnaire in addition to providing their protocol for CRSE management in ICU. 55 (73%) trusts responded. While 31 (56% of responders) had a protocol available in ICU for early stages of CSE, just 21 (38%) trusts had specific guidelines if CRSE occurred. Only 23 (42%) trusts involved neurologists at any stage of management and just 18 (33%) have access to continuous EEG monitoring. This study identifies significant inconsistency in the management of CSE in ICU's across the UK. A minority of ICU units have a protocol for CRSE or access to continuous EEG monitoring despite it being considered fundamental for management and supported by NICE guidance. Copyright © 2014 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.
Protocol for Communication Networking for Formation Flying
NASA Technical Reports Server (NTRS)
Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren
2009-01-01
An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 35 to Part 679—Apportionment of Crab PSC and Halibut PSC Between the Amendment 80 and BSAI Trawl Limited Access Sectors Fishery Year Halibut PSC limit in the BSAI Zone 1 Red king crab PSC limit . . . C... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Apportionment of Crab PSC and Halibut PSC...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 35 to Part 679—Apportionment of Crab PSC and Halibut PSC Between the Amendment 80 and BSAI Trawl Limited Access Sectors Fishery Year Halibut PSC limit in the BSAI Zone 1 Red king crab PSC limit . . . C... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Apportionment of Crab PSC and Halibut PSC...
SpaceTime Environmental Image Information for Scene Understanding
2016-04-01
public Internet resources such as Google,65 MapQuest,66 Bing,67 and Yahoo Maps.68 Approved for public release; distribution unlimited. 9 Table 3...azimuth angle 3 Terrain and location: USACE AGC — Satellite/aerial imagery and terrain analysis 4 Terrain and location: Google, MapQuest, Bing, Yahoo ...Maps. [accessed 2015 Dec]. https://www.bing.com/maps/. 68. YAHOO ! Maps. [accessed 2015 Dec]. https://maps.yahoo.com/b/. 69. 557th Weather Wing. US
Effect of a feed/fast protocol on pH in the proximal equine stomach.
Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N
2009-09-01
Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.
1998-05-11
operation to the warden. Wardens advertise their operations to the viceroy by means of a warden table, which lists each function supported by the warden...Application Adaptation in Moblie Computing Environments. In Proceedings of the Twenty-First Annual International Computer Software and Applications
Gaining Access to the Internet.
ERIC Educational Resources Information Center
Notess, Greg R.
1992-01-01
Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…
Quantum CSMA/CD Synchronous Communication Protocol with Entanglement
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Zeng, Binyang; Gong, Lihua
By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
Magasi, Susan; Harniss, Mark; Heinemann, Allen W
2018-01-01
Principles of fairness in testing require that all test takers, including people with disabilities, have an equal opportunity to demonstrate their capacity on the construct being measured. Measurement design features and assessment protocols can pose barriers for people with disabilities. Fairness in testing is a fundamental validity issue at all phases in the design, administration, and interpretation of measurement instruments in clinical practice and research. There is limited guidance for instrument developers on how to develop and evaluate the accessibility and usability of measurement instruments. This article describes a 6-stage iterative process for developing accessible computer-administered measurement instruments grounded in the procedures implemented across several major measurement initiatives. A key component of this process is interdisciplinary teams of accessibility experts, content and measurement experts, information technology experts, and people with disabilities working together to ensure that measurement instruments are accessible and usable by a wide range of users. The development of accessible measurement instruments is not only an ethical requirement, it also ensures better science by minimizing measurement bias, missing data, and attrition due to mismatches between the target population and test administration platform and protocols. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
The Live Access Server Scientific Product Generation Through Workflow Orchestration
NASA Astrophysics Data System (ADS)
Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.
2006-12-01
The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google Earth layers using KML; generation of maps via WMS or ArcIMS protocols; and data manipulation with Unix utilities.
Bańkosz, Ziemowit; Winiarski, Sławomir
2018-01-01
The aim of this study was to determine the correlations between angular velocities in individual joints and racket velocity for different topspin forehand and backhand strokes in table tennis. Ten elite female table tennis players participated, presenting different kinds of topspin forehands and backhands – after a no-spin ball (FH1, BH1), after a backspin ball (FH2, BH2) and “heavy” topspin (FH3, BH3). Range of motion was measured with the BTS Smart-E (BTS Bioengineering, Milan, Italy) motion analysis system with a specially developed marker placement protocol for the upper body parts and an acoustic sensor attached to the racket to identify ball-racket contact. In forehand strokes angular velocities of internal arm rotation and adduction in shoulder joint correlated with racket velocity. Racket velocity was correlated with angular velocities (hip extension on the playing side; hip flexion on the opposite side; ankle flexion) in the case of a topspin forehand performed with maximal force –”heavy” topspin (FH3). In backhand strokes the velocities of arm abduction and shoulder girdle rotation towards the playing side correlated with racket velocity. The angular velocity of internal arm rotation and adduction in shoulder joint may be important components of a coordinated stroke, whilst angular velocity can substantially affect the racket speed when one is changing the type of stroke. Key points The aim of this study was to calculate correlations between racket velocity and the angular velocities of individual joints and for variants of topspin forehand and backhand strokes in table tennis. A novel model was used to estimate range of motion (specially developed placement protocol for upper body markers and identification of a ball-racket contact using an acoustic sensor attached to the racket). In forehand strokes angular velocities of internal arm rotation and adduction in shoulder joint were correlated with racket velocity. Correlations between racket velocity and the angular velocities of playing- and non-playing-side hip extension and ankle flexion were found in topspin forehands. In topspin backhands abduction of the arm had the greatest impact on the racket speed. The results can be used directly to improve training of table tennis techniques, especially topspin strokes. PMID:29769835
Obtaining i.v. fosfomycin through an expanded-access protocol.
Frederick, Corey M; Burnette, Jennifer; Aragon, Laura; Gauthier, Timothy P
2016-08-15
One hospital's experience with procuring i.v. fosfomycin via an expanded-access protocol to treat a panresistant infection is described. In mid-2014, a patient at a tertiary care institution had an infection caused by a gram-negative pathogen expressing notable drug resistance. Once it was determined by the infectious diseases (ID) attending physician that i.v. fosfomycin was a possible treatment for this patient, the ID pharmacist began the process of drug procurement. The research and ID pharmacists completed an investigational new drug (IND) application, which required patient-specific details and contributions from the ID physician. After obtaining approval of the IND, an Internet search identified a product vendor in the United Kingdom, who was then contacted to begin the drug purchasing and acquisition processes. Authorization of the transaction required signatures from key senior hospital administrators, including the chief financial officer and the chief operating officer. Approximately 6 days after beginning the acquisition process, the research pharmacist arranged for the wholesaler to expedite product delivery. The ID pharmacist contacted the wholesaler's shipping company at the U.S. Customs Office, providing relevant contact information to ensure that any unexpected circumstances could be quickly addressed. The product arrived at the U.S. Customs Office 8 days after beginning the acquisition process and was held in the U.S. Customs Office for 2 days. The patient received the first dose of i.v. fosfomycin 13 days after starting the expanded-access protocol process. I.V. fosfomycin was successfully procured through an FDA expanded-access protocol by coordinating efforts among ID physicians, pharmacists, and hospital executives. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.
Tailor, Vijay; Glaze, Selina; Unwin, Hilary; Bowman, Richard; Thompson, Graham; Dahlmann-Noor, Annegret
2016-10-01
Children and adults with neurological impairments are often not able to access conventional perimetry; however, information about the visual field is valuable. A new technology, saccadic vector optokinetic perimetry (SVOP), may have improved accessibility, but its accuracy has not been evaluated. We aimed to explore accessibility, testability and accuracy of SVOP in children with neurodisability or isolated visual pathway deficits. Cohort study; recruitment October 2013-May 2014, at children's eye clinics at a tertiary referral centre and a regional Child Development Centre; full orthoptic assessment, SVOP (central 30° of the visual field) and confrontation visual fields (CVF). Group 1: age 1-16 years, neurodisability (n=16), group 2: age 10-16 years, confirmed or suspected visual field defect (n=21); group 2 also completed Goldmann visual field testing (GVFT). Group 1: testability with a full 40-point test protocol is 12.5%; with reduced test protocols, testability is 100%, but plots may be clinically meaningless. Children (44%) and parents/carers (62.5%) find the test easy. SVOP and CVF agree in 50%. Group 2: testability is 62% for the 40-point protocol, and 90.5% for reduced protocols. Corneal changes in childhood glaucoma interfere with SVOP testing. All children and parents/carers find SVOP easy. Overall agreement with GVFT is 64.7%. While SVOP is highly accessible to children, many cannot complete a full 40-point test. Agreement with current standard tests is moderate to poor. Abnormal saccades cause an apparent non-specific visual field defect. In children with glaucoma or nystagmus SVOP calibration often fails. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Bernard, Lise; Roche, Béatrice; Batisse, Marie; Maqdasy, Salwan; Terral, Daniel; Sautou, Valérie; Tauveron, Igor
2016-10-01
In non-critically ill patients, the use of an insulin syringe pump allows the management of temporary situations during which other therapies cannot be used (failure of subcutaneous injections, awaiting advice from the diabetes team, emergency situations, prolonged corticosteroid therapy, initiation of an artificial nutrition, need for a fasting status, etc.). To manage the risks related to this «never event», the use of a standard validated protocol for insulin administration and monitoring is an essential prerequisite. To this end, a multidisciplinary approach is recommended. With the support of our subcommission «Endocrinology-Diabetology», we proceeded with a «step-by-step process» to create such a standardized protocol: (1) review of all existing protocols in our hospital; (2) overview of the literature data concerning insulin infusion protocols developed by multidisciplinary teams in France and abroad; (3) development of a standardized protocol for non-intensive care unit patients, respecting the current recommendations and adapting it to the working habits of health teams; and (4) validation of the protocol Two protocols based on the same structure but adapted to the health status of the patient have been developed. The protocols are divided in to three parts: (1) golden rules to make the use of the protocol appropriate and safe; (2) the algorithm (a double entry table) corresponding to a dynamic adaptation of insulin doses, clearly defining the target and the 'at risk situations'; and (3) practical aspects of the protocol: preparation of the syringe, treatment initiation and traceability. The protocols have been validated by the institution. Our standardized insulin infusion protocol is simple, easy to implement, safe and is likely to be applicable in diverse care units. However, the efficiency, safety and the workability of our protocols have to be clinically evaluated. © 2016 John Wiley & Sons, Ltd.
IP access networks with QoS support
NASA Astrophysics Data System (ADS)
Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique
2001-07-01
The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.
Analysis of practical backoff protocols for contention resolution with multiple servers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldberg, L.A.; MacKenzie, P.D.
Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less
2015-09-01
the network Mac8 Medium Access Control ( Mac ) (Ethernet) address observed as destination for outgoing packets subsessionid8 Zero-based index of...15. SUBJECT TERMS tactical networks, data reduction, high-performance computing, data analysis, big data 16. SECURITY CLASSIFICATION OF: 17...Integer index of row cts_deid Device (instrument) Identifier where observation took place cts_collpt Collection point or logical observation point on
Very High-Speed Report File System
1992-12-15
1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol
NASA Astrophysics Data System (ADS)
Yun, Changho; Kim, Kiseon
2006-04-01
For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
2015-06-01
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
NASA Astrophysics Data System (ADS)
Mateescu, Radu; Serwe, Wendelin
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.
Extremely high data-rate, reliable network systems research
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Mukkamala, R.; Murray, Nicholas D.; Overstreet, C. Michael
1990-01-01
Significant progress was made over the year in the four focus areas of this research group: gigabit protocols, extensions of metropolitan protocols, parallel protocols, and distributed simulations. Two activities, a network management tool and the Carrier Sensed Multiple Access Collision Detection (CSMA/CD) protocol, have developed to the point that a patent is being applied for in the next year; a tool set for distributed simulation using the language SIMSCRIPT also has commercial potential and is to be further refined. The year's results for each of these areas are summarized and next year's activities are described.
Automating individualized coaching and authentic role-play practice for brief intervention training.
Hayes-Roth, B; Saker, R; Amano, K
2010-01-01
Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
Reports on Cancer - Cancer Statistics
Interactive tools for access to statistics for a cancer site by gender, race, ethnicity, calendar year, age, state, county, stage, and histology. Statistics include incidence, mortality, prevalence, cost, risk factors, behaviors, tobacco use, and policies and are presented as graphs, tables, or maps.
Component, Context, and Manufacturing Model Library (C2M2L)
2012-11-01
123 5.1 MML Population and Web Service Interface...104 Table 41. Relevant Questions with Associated Web Services...the models, and implementing web services that provide semantically aware programmatic access to the models, including implementing the MS&T
Animals & Livestock | National Agricultural Library
Skip to main content Home National Agricultural Library United States Department of Agriculture Ag (maps, tables, graphs), Agricultural Products html National Animal Nutrition Program (NANP) Feed | Agricultural Research Service | Plain Language | FOIA | Accessibility Statement | Information Quality | Privacy
Land-mobile satellite communication system
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)
1993-01-01
A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks
Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo
2014-01-01
Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814
Kute, Vivek B; Patel, Himanshu V; Shah, Pankaj R; Modi, Pranjal R; Shah, Veena R; Rizvi, Sayyed J; Pal, Bipin C; Modi, Manisha P; Shah, Priya S; Varyani, Umesh T; Wakhare, Pavan S; Shinde, Saiprasad G; Ghodela, Viajay A; Patel, Minaxi H; Trivedi, Varsha B; Trivedi, Hargovind L
2016-01-01
The combination of kidney paired donation (KPD) with desensitization represents a promising method of increasing the rate of living donor kidney transplantation (LDKT) in immunologically challenging patients. Patients who are difficult to match and desensitize due to strong donor specific antibody are may be transplanted by a combination of desensitization and KPD protocol with more immunologically favorable donor. We present our experience of combination of desensitization protocol with three-way KPD which contributed to successful LDKT in highly sensitized end stage renal disease patient. All recipients were discharged with normal and stable allograft function at 24 mo follow up. We believe that this is first report from India where three-way KPD exchange was performed with the combination of KPD and desensitization. The combination of desensitization protocol with KPD improves access and outcomes of LDKT. PMID:27803919
Mahrwald, R
2015-09-21
The aggressive and strong development of organocatalysis provides several protocols for the convenient utilization of the carbonyl function of unprotected carbohydrates in C-C-bond formation processes. These amine-catalyzed mechanisms enable multiple cascade-protocols for the synthesis of a wide range of carbohydrate-derived compound classes. Several, only slightly different protocols, have been developed for the application of 1,3-dicarbonyl compounds in the stereoselective chain-elongation of unprotected carbohydrates and the synthesis of highly functionalized C-glycosides of defined configuration. In addition, C-glycosides can also be accessed by amine-catalyzed reactions with methyl ketones. By a one-pot cascade reaction of isocyanides with unprotected aldoses and amino acids access to defined configured glycopeptide mimetics is achieved. Depending on the reaction conditions different origins to control the installation of configuration during the bond-formation process were observed.
Access Protocol For An Industrial Optical Fibre LAN
NASA Astrophysics Data System (ADS)
Senior, John M.; Walker, William M.; Ryley, Alan
1987-09-01
A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.
The HEASARC graphical user interface
NASA Technical Reports Server (NTRS)
White, N.; Barrett, P.; Jacobs, P.; Oneel, B.
1992-01-01
An OSF/Motif-based graphical user interface has been developed to facilitate the use of the database and data analysis software packages available from the High Energy Astrophysics Science Archive Research Center (HEASARC). It can also be used as an interface to other, similar, routines. A small number of tables are constructed to specify the possible commands and command parameters for a given set of analysis routines. These tables can be modified by a designer to affect the appearance of the interface screens. They can also be dynamically changed in response to parameter adjustments made while the underlying program is running. Additionally, a communication protocol has been designed so that the interface can operate locally or across a network. It is intended that this software be able to run on a variety of workstations and X terminals.
Information extraction for enhanced access to disease outbreak reports.
Grishman, Ralph; Huttunen, Silja; Yangarber, Roman
2002-08-01
Document search is generally based on individual terms in the document. However, for collections within limited domains it is possible to provide more powerful access tools. This paper describes a system designed for collections of reports of infectious disease outbreaks. The system, Proteus-BIO, automatically creates a table of outbreaks, with each table entry linked to the document describing that outbreak; this makes it possible to use database operations such as selection and sorting to find relevant documents. Proteus-BIO consists of a Web crawler which gathers relevant documents; an information extraction engine which converts the individual outbreak events to a tabular database; and a database browser which provides access to the events and, through them, to the documents. The information extraction engine uses sets of patterns and word classes to extract the information about each event. Preparing these patterns and word classes has been a time-consuming manual operation in the past, but automated discovery tools now make this task significantly easier. A small study comparing the effectiveness of the tabular index with conventional Web search tools demonstrated that users can find substantially more documents in a given time period with Proteus-BIO.
Traffic management mechanism for intranets with available-bit-rate access to the Internet
NASA Astrophysics Data System (ADS)
Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed
1997-10-01
The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
2008-10-01
Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 3 Table of Contents ...Protocols and Restrictive Blood Transfusion Strategies on Glucose Measurement in American Burn Association ( ABA ) Verified Burn 13 Centers. Journal...civilian experts in trauma care as well as policy makers and include: CAPT (Ret) Frank Butler, Col (Ret) Donald Jenkins, COL (Ret) John Holcomb, Dr. Basil
Understanding Consistency Maintenance in Service Discovery Architectures in Response to Message Loss
2002-07-01
manager (SM), and (3) service cache manager ( SCM ). The SCM is an optional element not supported by all discovery protocols. These components participate...the SCM operates as an intermediary, matching advertised SDs of SMs to requirements provided by SUs. Table 1 shows how these general concepts map...Service DescriptionService ItemService Description (SD) Directory Service Agent (optional) not applicableLookup ServiceService Cache Manager ( SCM
2009-03-01
time and the router CPU loads are comparable to those reported by two former NPS theses that examined alternative solutions based on BGP blackhole ...routing. 15. NUMBER OF PAGES 135 14. SUBJECT TERMS Traffic Engineering, Distributed Denial of Service Attacks, Sinkhole Routing, Blackhole Routing...alternative solutions based on BGP blackhole routing. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION
Improving the Rainbow Attack by Reusing Colours
NASA Astrophysics Data System (ADS)
Ågren, Martin; Johansson, Thomas; Hell, Martin
Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.
2003-06-03
staff, health care delivery concepts, accessibility, ethics, quality / risk management , technology, and marketing (Table 5 - Hudak et al. 1993). The domain...cost/finance, healthcare delivery, access to care, quality / risk management , technology, professional staff relations, leadership, marketing, and ethics...finance was the second highest rated domain for physicians, this group included quality / risk management and technology among their top four (Hudak et al
A performance study of WebDav access to storages within the Belle II collaboration
NASA Astrophysics Data System (ADS)
Pardi, S.; Russo, G.
2017-10-01
WebDav and HTTP are becoming popular protocols for data access in the High Energy Physics community. The most used Grid and Cloud storage solutions provide such kind of interfaces, in this scenario tuning and performance evaluation became crucial aspects to promote the adoption of these protocols within the Belle II community. In this work, we present the results of a large-scale test activity, made with the goal to evaluate performances and reliability of the WebDav protocol, and study a possible adoption for the user analysis. More specifically, we considered a pilot infrastructure composed by a set of storage elements configured with the WebDav interface, hosted at the Belle II sites. The performance tests include a comparison with xrootd and gridftp. As reference tests we used a set of analysis jobs running under the Belle II software framework, accessing the input data with the ROOT I/O library, in order to simulate as much as possible a realistic user activity. The final analysis shows the possibility to achieve promising performances with WebDav on different storage systems, and gives an interesting feedback, for Belle II community and for other high energy physics experiments.
Providing Internet Access to High-Resolution Lunar Images
NASA Technical Reports Server (NTRS)
Plesea, Lucian
2008-01-01
The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.
Stationary table CT dosimetry and anomalous scanner-reported values of CTDI{sub vol}
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dixon, Robert L., E-mail: rdixon@wfubmc.edu; Boone, John M.
2014-01-15
Purpose: Anomalous, scanner-reported values of CTDI{sub vol} for stationary phantom/table protocols (having elevated values of CTDI{sub vol} over 300% higher than the actual dose to the phantom) have been observed; which are well-beyond the typical accuracy expected of CTDI{sub vol} as a phantom dose. Recognition of these outliers as “bad data” is important to users of CT dose index tracking systems (e.g., ACR DIR), and a method for recognition and correction is provided. Methods: Rigorous methods and equations are presented which describe the dose distributions for stationary-table CT. A comparison with formulae for scanner-reported values of CTDI{sub vol} clearly identifiesmore » the source of these anomalies. Results: For the stationary table, use of the CTDI{sub 100} formula (applicable to a moving phantom only) overestimates the dose due to extra scatter and also includes an overbeaming correction, both of which are nonexistent when the phantom (or patient) is held stationary. The reported DLP remains robust for the stationary phantom. Conclusions: The CTDI-paradigm does not apply in the case of a stationary phantom and simpler nonintegral equations suffice. A method of correction of the currently reported CTDI{sub vol} using the approach-to-equilibrium formula H(a) and an overbeaming correction factor serves to scale the reported CTDI{sub vol} values to more accurate levels for stationary-table CT, as well as serving as an indicator in the detection of “bad data.”.« less
Cantos, Emma; Espín, Juan Carlos; Tomás-Barberán, Francisco A
2002-10-23
The red table grape varieties Flame, Red Globe, Crimson, and Napoleon, as well as the white varieties Superior, Dominga, and Moscatel Italica, were irradiated with a previously optimized UV-C postharvest irradiation protocol (510 W, 40 cm, 60 s). The induction kinetics of the stilbenes trans-resveratrol, trans-piceid, trans-piceatannol, trans-astringin, and viniferins was followed by using HPLC-DAD/MS/MS. The most inducible stilbenes were trans-resveratrol, trans-piceatannol, and viniferins. Both quantitative and qualitative differences were observed in both the stilbene induction kinetics and stilbene content in the seven table grapes analyzed here. The total resveratrol content ranged from 0.69 mg/100 g fw (Dominga) to 2.3 mg/100 g fw (Red Globe). The net resveratrol induction ranged from 3.4-fold (Flame) to 2315-fold (Red Globe). The highest viniferins content was observed in the variety Flame (0.73 mg/100 g fw), although the variety Red Globe presented the highest viniferins induction (175-fold). The highest content and induction of piceatannol (0.17 mg/100 g fw and 173-fold, respectively) was observed in the variety Flame. It should be stressed that taking into account the health-beneficial effects claimed for stilbenes, the UV-C irradiated table grapes can be considered as new functional fruits that can supply (a serving of unpeeled 200 g table grapes) the resveratrol content (depending on the variety) equivalent to more than seven glasses of red wine ( approximately 1.5 L) with high resveratrol content.
South Dakota Department of Education Data Access Policy
ERIC Educational Resources Information Center
South Dakota Department of Education, 2015
2015-01-01
The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stone, N. J., E-mail: n.stone@physics.ox.ac.uk
The most recent tabulations of nuclear magnetic dipole and electric quadrupole moments have been prepared and published by the Nuclear Data Section of the IAEA, Vienna [N. J. Stone, Report No. INDC(NDS)-0650 (2013); Report No. INDC(NDS)-0658 (2014)]. The first of these is a table of recommended quadrupole moments for all isotopes in which all experimental results are made consistent with a limited number of adopted standards for each element; the second is a combined listing of all measurements of both moments. Both tables cover all isotopes and energy levels. In this paper, the considerations relevant to the preparation of bothmore » tables are described, together with observations as to the importance and (where appropriate) application of necessary corrections to achieve the “best” values. Some discussion of experimental methods is included with emphasis on their precision. The aim of the published quadrupole moment table is to provide a standard reference in which the value given for each moment is the best available and for which full provenance is given. A table of recommended magnetic dipole moments is in preparation, with the same objective in view.« less
Dos Santos, Raquel Rodrigues; Niquini, Roberta Pereira; Bastos, Francisco Inácio; Domingues, Rosa Maria Soares Madeira
2017-01-01
The study aimed to assess conformity with Brazil's standard protocol for diagnostic and therapeutic practices in the management of congenital syphilis by pediatricians in public maternity hospitals. A cross-sectional study was conducted in 2015 with 41 pediatricians working in all the public maternity hospitals in Teresina, the capital of Piauí State, Northeast Brazil, through self-completed questionnaires. The study assessed the conformity of knowledge and practices according to the Brazilian Ministry of Health protocols. The study has made evident low access to training courses (54%) and insufficient knowledge of the case definition of congenital syphilis (42%) and rapid tests for syphilis (39%). Flaws were observed in the diagnostic workup and treatment of newborns. Requesting VDRL (88%) and correct treatment of neurosyphilis (88%) were the practices that showed the highest conformity with standard protocols. Low conformity with protocols leads to missed opportunities for identifying and adequately treating congenital syphilis. Based on the barriers identified in the study, better access to diagnostic and treatment protocols, improved recording on prenatal cards and hospital patient charts, availability of tests and medicines, and educational work with pregnant women should be urgently implemented, aiming to reverse the currently inadequate management of congenital syphilis and to curb its spread.
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
Intelligent Cooperative MAC Protocol for Balancing Energy Consumption
NASA Astrophysics Data System (ADS)
Wu, S.; Liu, K.; Huang, B.; Liu, F.
To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.
On Alarm Protocol in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin
We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.
Device USB interface and software development for electric parameter measuring instrument
NASA Astrophysics Data System (ADS)
Li, Deshi; Chen, Jian; Wu, Yadong
2003-09-01
Aimed at general devices development, this paper discussed the development of USB interface and software development. With an example, using PDIUSBD12 which support parallel interface, the paper analyzed its technical characteristics. Designed different interface circuit with 80C52 singlechip microcomputer and TMS320C54 series digital signal processor, analyzed the address allocation, register access. According to USB1.1 standard protocol, designed the device software and application layer protocol. The paper designed the data exchange protocol, and carried out system functions.
78 FR 20344 - Proposed Flood Hazard Determinations
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-04
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2013-0002... the online location and the respective Community Map Repository address listed in the tables below. Additionally, the current effective FIRM and FIS report for each community are accessible online through the...
77 FR 18835 - Proposed Flood Hazard Determinations
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-28
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2012-0003... the online location and the respective Community Map Repository address listed in the tables below. Additionally, the current effective FIRM and FIS report for each community are accessible online through the...
33 CFR 149.680 - What are the requirements for medical treatment rooms?
Code of Federal Regulations, 2010 CFR
2010-07-01
... on a stretcher; (c) A single berth or examination table that is accessible from both sides; and (d) A... accommodation modules, must have a medical treatment room that has: (a) A sign at the entrance designating it as...
33 CFR 149.680 - What are the requirements for medical treatment rooms?
Code of Federal Regulations, 2011 CFR
2011-07-01
... on a stretcher; (c) A single berth or examination table that is accessible from both sides; and (d) A... accommodation modules, must have a medical treatment room that has: (a) A sign at the entrance designating it as...
Cyrillic Transliteration and Its Users.
ERIC Educational Resources Information Center
Aissing, Alena L.
1995-01-01
Explores problems of three groups of Russian-language students using romanized Cyrillic bibliographic records. Investigates students' ability to keyword search using Russian records romanized according to Library of Congress transliteration tables. Results show that transliteration is one of the factors limiting access by Russian-language students…
Whither the White Knight: CDROM in Technical Services.
ERIC Educational Resources Information Center
Campbell, Brian
1987-01-01
Outlines evaluative criteria and compares optical data disk products used in library technical processes, including bibliographic records for cataloging, acquisition databases, and local public access catalogs. An extensive table provides information on specific products, including updates, interfaces, edit screens, installation help, manuals,…
A Hybrid Lifetime Extended Directional Approach for WBANs
Li, Changle; Yuan, Xiaoming; Yang, Li; Song, Yueyang
2015-01-01
Wireless Body Area Networks (WBANs) can provide real-time and reliable health monitoring, attributing to the human-centered and sensor interoperability properties. WBANs have become a key component of the ubiquitous eHealth (electronic health) revolution that prospers on the basis of information and communication technologies. The prime consideration in WBAN is how to maximize the network lifetime with battery-powered sensor nodes in energy constraint. Novel solutions in Medium Access Control (MAC) protocols are imperative to satisfy the particular BAN scenario and the need of excellent energy efficiency in healthcare applications. In this paper, we propose a hybrid Lifetime Extended Directional Approach (LEDA) MAC protocol based on IEEE 802.15.6 to reduce energy consumption and prolong network lifetime. The LEDA MAC protocol takes full advantages of directional superiority in energy saving that employs multi-beam directional mode in Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) and single-beam directional mode in Time Division Multiple Access (TDMA) for alternative in data reservation and transmission according to the traffic varieties. Moreover, the impacts of some inherent problems of directional antennas such as deafness and hidden terminal problem can be decreased owing to that all nodes generate individual beam according to user priorities designated. Furthermore, LEDA MAC employs a Dynamic Polled Allocation Period (DPAP) for burst data transmissions to increase the network reliability and adaptability. Extensive analysis and simulation results show that the proposed LEDA MAC protocol achieves extended network lifetime with improved performance compared with IEEE 802.15.6. PMID:26556357
Experimental plasma astrophysics using a T{sup 3} (Table-top Terawatt) laser
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tajima, T.
1996-11-01
Lasers that can deliver immense power of Terawatt (10{sup 12}W) and can still compactly sit on a Table-Top (T{sup 3} lasers) emerged in the 1990s. The advent of these lasers allows us to access to regimes of astronomical physical conditions that once thought impossible to realize in a terrestrial laboratory. We touch on examples that include superhigh pressure materials that may resemble the interior of giant planets and white dwarfs and of relativistic temperature plasmas that may exist in the early cosmological epoch and in the neighborhood of the blackhole event horizon.
Mitchell, Katherine M; Pritchett, Robert C; Gee, David L; Pritchett, Kelly L
2017-09-01
Mitchell, KM, Pritchett, RC, Gee, DL, and Pritchett, KL. Comparison of circumference measures and height-weight tables with dual-energy X-ray absorptiometry assessment of body composition in R.O.T.C. cadets. J Strength Cond Res 31(9): 2552-2556, 2017-Height-weight tables and circumference measures are used by the U.S. Army to predict body composition because they require little equipment or expertise. However, agreement between the Army's new 2002 circumference equation and an established laboratory technique has not been determined. The purpose of this study was to quantify agreement in body fat percentages between the Army's circumference measures (taping) and dual-energy X-ray absorptiometry (DXA); second to determine categorical agreement between height-weight tables and DXA. Male Reserve Officer Training Corps (R.O.T.C.) cadets (N = 23; 20.6 ± 1.6 years, 179.1 ± 6.6 cm; 81.4 ± 10.3 kg) were taped according to Army protocol to predict body fat. The % body fat prediction was compared with DXA through a Bland-Altman Plot with ±2-4% body fat established as a zone of agreement (ZOA). Thirteen out of 23 cadets fell outside the ZOA. No cadet was over the compliance threshold (20-22% fat) using the tape method, however, with DXA, 7 out of 23 cadets were noncompliant. Height-weight tables provided a moderate level of categorical agreement with DXA. The results depict poor agreement between taping and DXA, as taping generally underestimated % body fat. Compared with taping, height-weight tables were better able to identify excess fat weight.
Improving management performance of P2PSIP for mobile sensing in wireless overlays.
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-11-08
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.
Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-01-01
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358
Devailly, Guillaume; Mantsoki, Anna; Joshi, Anagha
2016-11-01
Better protocols and decreasing costs have made high-throughput sequencing experiments now accessible even to small experimental laboratories. However, comparing one or few experiments generated by an individual lab to the vast amount of relevant data freely available in the public domain might be limited due to lack of bioinformatics expertise. Though several tools, including genome browsers, allow such comparison at a single gene level, they do not provide a genome-wide view. We developed Heat*seq, a web-tool that allows genome scale comparison of high throughput experiments chromatin immuno-precipitation followed by sequencing, RNA-sequencing and Cap Analysis of Gene Expression) provided by a user, to the data in the public domain. Heat*seq currently contains over 12 000 experiments across diverse tissues and cell types in human, mouse and drosophila. Heat*seq displays interactive correlation heatmaps, with an ability to dynamically subset datasets to contextualize user experiments. High quality figures and tables are produced and can be downloaded in multiple formats. Web application: http://www.heatstarseq.roslin.ed.ac.uk/ Source code: https://github.com/gdevailly CONTACT: Guillaume.Devailly@roslin.ed.ac.uk or Anagha.Joshi@roslin.ed.ac.ukSupplementary information: Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.
OCP: Opportunistic Carrier Prediction for Wireless Networks
2008-08-01
Many protocols have been proposed for medium access control in wireless networks. MACA [13], MACAW [3], and FAMA [8] are the earlier proposals for...world performance of carrier sense. In Proceedings of ACM SIGCOMM E-WIND Workshop, 2005. [13] P. Karn. MACA : A new channel access method for packet radio
ERIC Educational Resources Information Center
Hannah, Mark A.; Arreguin, Alex
2017-01-01
Gaining access to interdisciplinary research sites poses unique research challenges to technical and professional communication scholars and practitioners. Drawing on applied experiences in externally funded interdisciplinary research projects and scholarship about interdisciplinary research, this article describes a training protocol for…
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...
Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.
ERIC Educational Resources Information Center
Webster, Peter
2002-01-01
Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)
Techtalk: Telecommunications for Improving Developmental Education.
ERIC Educational Resources Information Center
Caverly, David C.; Broderick, Bill
1993-01-01
Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)
ERIC Educational Resources Information Center
Wiggins, Rich
1993-01-01
Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…
USDA-ARS?s Scientific Manuscript database
The presence of Avocado Sunblotch Viroid (ASBVd) infection among the avocado (Persea americana Mill.) accessions in the National Germplasm Repository at Miami (NGR-Mia) was established in previous studies. An ASBVd specific reverse transcription-polymerase chain reaction (RT-PCR) protocol was used t...
ERIC Educational Resources Information Center
Calderon, Carlos Trevino
2012-01-01
The purpose of this sequential mixed methods case study was to explore the role of a teacher's attitude towards Sheltered Instruction Observation Protocols (SIOP) and how those attitudes affect the program's effectiveness. SIOP is a program designed to mitigate the effects of limited English proficiency and promote equal access to the curriculum…
Soil Water and Shallow Groundwater Relations in an Agricultural Hillslope
NASA Astrophysics Data System (ADS)
Logsdon, S. D.; Schilling, K. E.
2007-12-01
Shallow water tables contribute to soil water variations under rolling topography, and soil properties contribute to shallow water table fluctutations. Preferential flow through large soil pores can cause a rise in the water table with little increase in soil water except near the soil surface. Lateral groundwater flow can cause a large rise in water table at toeslope and depressional landscape positions. As plants transpire, water can move up into the root zone from the water table and wet soil below the root zone. Roots can utilize water in the capillary fringe. The purpose of this study was to interface automated measurements of soil water content and water table depth for determining the importance of drainage and upward movement. In 2006 soil water and water table depth were monitored at three positions: shoulder, backslope, and toeslope. Neutron access tubes were manually monitored to 2.3 m depth, and automated soil moisture was measured using CS616 probes installed at 0.3, 0.5, 0.7, and 0.9 m depth. Water table depths were monitored manually and automated, but the automated measurements failed during the season at two sites. In 2007, similar measurements were made at one toeslope position, but the CS616 probes were installed at nine depths and better quality automated well depth equipment was used. The 2006 data revealed little landscape position effect on daytime soil water loss on a wetter date; however, on a dry day just before a rain, daytime water loss was greatest for the toeslope positon and least for the shoulder position. After a period of intense rain, a rapid and significant water table rise occurred at the toeslope position but little water table rise occurred at the other landscape positions. The rapid toeslope water table rise was likely caused by lateral groundwater flow whereas minor water table rise at the other positions was likely due to preferential flow since the soil had not wet up below 0.6 m. Use of automated equipment has improved our understanding of the relations of soil water to water table fluctuations in an agricultural field.
NASA Astrophysics Data System (ADS)
Dance, D. R.; Young, K. C.
2014-05-01
The UK, European and IAEA protocols for breast dosimetry in mammography use tabulations of conversion factors, which relate measurements of incident air kerma to the mean glandular dose to the breast. To supplement the existing tabulations, a Monte Carlo computer program has been used to calculate conversion factors for the high-energy spectra used for contrast enhanced digital mammography. The calculations were made for the x-ray spectra from a tungsten target (tube voltage range 40-50 kV) filtered by 0.28, 0.30 and 0.32 mm of copper, and from molybdenum and rhodium targets (tube voltage range 40-49 kV), each filtered by 0.30 mm of copper. The g-factors for all of these spectra were plotted for each breast thickness as a function of half value layer (HVL) and were found to lie on smooth curves within 0.3%. These reflect the fact that the characteristic x-rays present in the spectra from molybdenum and rhodium are heavily filtered and all the spectra are essentially Bremsstrahlung. As a consequence, the s-factor previously used in the dosimetry protocols to adjust for different target/filter combinations can be taken as unity for all of the spectra considered. Tables of g-factors and c-factors are provided for breast thicknesses in the range 20-110 mm and HVLs in the range 2.4-3.6 mm of aluminium. The tables of c-factors are given for breast glandularities in the range 0.1%-100% and for typical glandularities for women in the age bands 40-49 and 50-64 attending the UK national breast screening programme.
Fellin, Francesco; Righetto, Roberto; Fava, Giovanni; Trevisan, Diego; Amelio, Dante; Farace, Paolo
2017-03-01
To investigate the range errors made in treatment planning due to the presence of the immobilization devices along the proton beam path. The measured water equivalent thickness (WET) of selected devices was measured by a high-energy spot and a multi-layer ionization chamber and compared with that predicted by treatment planning system (TPS). Two treatment couches, two thermoplastic masks (both un-stretched and stretched) and one headrest were selected. At TPS, every immobilization device was modelled as being part of the patient. The following parameters were assessed: CT acquisition protocol, dose-calculation grid-sizes (1.5 and 3.0mm) and beam-entrance with respect to the devices (coplanar and non-coplanar). Finally, the potential errors produced by a wrong manual separation between treatment couch and the CT table (not present during treatment) were investigated. In the thermoplastic mask, there was a clear effect due to beam entrance, a moderate effect due to the CT protocols and almost no effect due to TPS grid-size, with 1mm errors observed only when thick un-stretched portions were crossed by non-coplanar beams. In the treatment couches the WET errors were negligible (<0.3mm) regardless of the grid-size and CT protocol. The potential range errors produced in the manual separation between treatment couch and CT table were small with 1.5mm grid-size, but could be >0.5mm with a 3.0mm grid-size. In the headrest, WET errors were negligible (0.2mm). With only one exception (un-stretched mask, non-coplanar beams), the WET of all the immobilization devices was properly modelled by the TPS. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.
Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database
NASA Astrophysics Data System (ADS)
Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin
2014-06-01
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.
Recent improvements in the NASA technical report server
NASA Technical Reports Server (NTRS)
Maa, Ming-Hokng; Nelson, Michael L.
1995-01-01
The NASA Technical Report Server (NTRS), a World Wide Web (WWW) report distribution service, has been modified to allow parallel database queries, significantly decreasing user access time by an average factor of 2.3, access from clients behind firewalls and/or proxies which truncate excessively long Uniform Resource Locators (URL's), access to non-Wide Area Information Server (WAIS) databases, and compatibility with the Z39-50.3 protocol.
Garcia, Santiago; Drexel, Todd; Bekwelem, Wobo; Raveendran, Ganesh; Caldwell, Emily; Hodgson, Lucinda; Wang, Qi; Adabag, Selcuk; Mahoney, Brian; Frascone, Ralph; Helmer, Gregory; Lick, Charles; Conterato, Marc; Baran, Kenneth; Bart, Bradley; Bachour, Fouad; Roh, Steven; Panetta, Carmelo; Stark, Randall; Haugland, Mark; Mooney, Michael; Wesley, Keith; Yannopoulos, Demetris
2016-01-07
In 2013 the Minnesota Resuscitation Consortium developed an organized approach for the management of patients resuscitated from shockable rhythms to gain early access to the cardiac catheterization laboratory (CCL) in the metro area of Minneapolis-St. Paul. Eleven hospitals with 24/7 percutaneous coronary intervention capabilities agreed to provide early (within 6 hours of arrival at the Emergency Department) access to the CCL with the intention to perform coronary revascularization for outpatients who were successfully resuscitated from ventricular fibrillation/ventricular tachycardia arrest. Other inclusion criteria were age >18 and <76 and presumed cardiac etiology. Patients with other rhythms, known do not resuscitate/do not intubate, noncardiac etiology, significant bleeding, and terminal disease were excluded. The primary outcome was survival to hospital discharge with favorable neurological outcome. Patients (315 out of 331) who were resuscitated from VT/VF and transferred alive to the Emergency Department had complete medical records. Of those, 231 (73.3%) were taken to the CCL per the Minnesota Resuscitation Consortium protocol while 84 (26.6%) were not taken to the CCL (protocol deviations). Overall, 197 (63%) patients survived to hospital discharge with good neurological outcome (cerebral performance category of 1 or 2). Of the patients who followed the Minnesota Resuscitation Consortium protocol, 121 (52%) underwent percutaneous coronary intervention, and 15 (7%) underwent coronary artery bypass graft. In this group, 151 (65%) survived with good neurological outcome, whereas in the group that did not follow the Minnesota Resuscitation Consortium protocol, 46 (55%) survived with good neurological outcome (adjusted odds ratio: 1.99; [1.07-3.72], P=0.03). Early access to the CCL after cardiac arrest due to a shockable rhythm in a selected group of patients is feasible in a large metropolitan area in the United States and is associated with a 65% survival rate to hospital discharge with a good neurological outcome. © 2016 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.
An Excellent Pilot Model for the Korean Air Force.
1988-12-01
Address i cirv, state, and ZIP c^-de 10 Source of Funding Numbers Proeram Element No Protect No Task No Work Inn Accession N i Title...undergraduate pilots in the Korean Air Force. ui ^t Accession Fcr • - • - ORAJcI i; U": it : • in .’ H J . m _ . ; . • fr A...Squares (OLS) method. Table 22. RESULTS OF THE REGRESSION MODEL Variables Coefficient Prob>|t| Beta Coefficient Intercept 516. SS7 (56.2S6) APT
Virtual Interactive Classroom: A New Technology for Distance Learning Developed
NASA Technical Reports Server (NTRS)
York, David W.; Babula, Maria
1999-01-01
The Virtual Interactive Classroom (VIC) allows Internet users, specifically students, to remotely control and access data from scientific equipment. This is a significant advantage to school systems that cannot afford experimental equipment, have Internet access, and are seeking to improve science and math scores with current resources. A VIC Development Lab was established at Lewis to demonstrate that scientific equipment can be controlled by remote users over the Internet. Current projects include a wind tunnel, a room camera, a science table, and a microscope.
Multi-Bit Quantum Private Query
NASA Astrophysics Data System (ADS)
Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing
2015-09-01
Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.
A hash based mutual RFID tag authentication protocol in telecare medicine information system.
Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C
2015-01-01
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
Accessibility and usability OCW data: The UTPL OCW.
Rodríguez, Germania; Perez, Jennifer; Cueva, Samanta; Torres, Rommel
2017-08-01
This data article provides a data description on article entitled "A framework for improving web accessibility and usability of Open Course Ware sites" [3] This Data in Brief presents the data obtained from the accessibility and usability evaluation of the UTPL OCW. The data obtained from the framework evaluation consists of the manual evaluation of the standards criteria and the automatic evaluation of the tools Google PageSpeed and Google Analytics. In addition, this article presents the synthetized tables from standards that are used by the framework to evaluate the accessibility and usability of OCW, and the questionnaires required to extract the data. As a result, the article also provides the data required to reproduce the evaluation of other OCW.
NHS should provide nurses with decent catering facilities.
Whelan, Adrian
2016-11-16
How about the NHS gives us access to decent catering facilities or even tables and chairs that aren't a 10 to 15-minute walk away from the ward or unit - which must be taken out of the already paltry half-hour meal break?
18 CFR 1304.205 - Other water-use facilities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... concrete boat launching ramp with associated driveway may be located within the access corridor... concrete is allowable; asphalt is not permitted. (b) Tables or benches for cleaning fish are permitted on... adjacent structures during winter drawdown. (h) Closed loop heat exchanges for residential heat pump...
18 CFR 1304.205 - Other water-use facilities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... concrete boat launching ramp with associated driveway may be located within the access corridor... concrete is allowable; asphalt is not permitted. (b) Tables or benches for cleaning fish are permitted on... adjacent structures during winter drawdown. (h) Closed loop heat exchanges for residential heat pump...
18 CFR 1304.205 - Other water-use facilities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... concrete boat launching ramp with associated driveway may be located within the access corridor... concrete is allowable; asphalt is not permitted. (b) Tables or benches for cleaning fish are permitted on... adjacent structures during winter drawdown. (h) Closed loop heat exchanges for residential heat pump...