To see the other types of publications on this topic, follow the link: Dropped messages.

Journal articles on the topic 'Dropped messages'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dropped messages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kumar, Saptaparni, and Jennifer L. Welch. "Implementing ♢P with Bounded Messages on a Network of ADD Channels." Parallel Processing Letters 29, no. 01 (2019): 1950002. http://dx.doi.org/10.1142/s0129626419500026.

Full text
Abstract:
We present an implementation of the eventually perfect failure detector [Formula: see text] from the original hierarchy of the Chandra-Toueg [3] oracles on an arbitrary partitionable network composed of unreliable channels that can lose and reorder messages. Prior implementations of [Formula: see text] have assumed different partially synchronous models ranging from bounded point-to-point message delay and reliable communication to unbounded message size and known network topologies. We implement [Formula: see text] under very weak assumptions on an arbitrary, partitionable network composed of Average Delayed/Dropped (ADD) channels [11] to model unreliable communication. Unlike older implementations, our failure detection algorithm uses bounded-sized messages to eventually detect all nodes that are unreachable (crashed or disconnected) from it.
APA, Harvard, Vancouver, ISO, and other styles
2

Branch, Philip, Binghao Li, and Kai Zhao. "A LoRa-Based Linear Sensor Network for Location Data in Underground Mining." Telecom 1, no. 2 (2020): 68–79. http://dx.doi.org/10.3390/telecom1020006.

Full text
Abstract:
In this paper, we describe a LoRa (from “Long Range”)-based, linear sensor network we have developed for transmitting location information of personnel and equipment in an underground mine. The system is intended to be used during emergencies when existing communications infrastructure has failed. Linear networks comprise a sequence of relays that forward data to a common destination, the headend. Relays forward location information transmitted from tags carried by personnel or equipment. Relays will usually be put in place as investigators or rescuers enter the mine. LoRa is used both by the tags to communicate to the relays and by the relays to forward messages to the headend. We have implemented and tested this system, and have carried out simulations and analyses to determine its scalability, reliability and fairness. The need for robustness and reliability has led us to use flooding rather than unicast communication. We also use message sequence numbers and time-to-live fields to prevent broadcast storms. Contention is managed using a simplified Carrier Sense Multiple Access (CSMA) scheme. We also address fairness. When the network is under load messages may be dropped by relays making messages generated more hops from the headend more likely to be dropped than messages nearer the headend. We explore the relationship between unfairness, traffic load and number of relays. We also observe that a network of larger numbers of lightly loaded relays performs more effectively than smaller numbers of heavily loaded relays.
APA, Harvard, Vancouver, ISO, and other styles
3

GIANNELLA, CHRIS, RANSOM WINDER, and STACY PETERSEN. "Dropped personal pronoun recovery in Chinese SMS." Natural Language Engineering 23, no. 6 (2017): 905–27. http://dx.doi.org/10.1017/s1351324917000158.

Full text
Abstract:
AbstractIn written Chinese, personal pronouns are commonly dropped when they can be inferred from context. This practice is particularly common in informal genres like Short Message Service messages sent via cell phones. Restoring dropped personal pronouns can be a useful preprocessing step for information extraction. Dropped personal pronoun recovery can be divided into two subtasks: (1) detecting dropped personal pronoun slots and (2) determining the identity of the pronoun for each slot. We address a simpler version of restoring dropped personal pronouns wherein only the person numbers are identified. After applying a word segmenter, we used a linear-chain conditional random field to predict which words were at the start of an independent clause. Then, using the independent clause start information, as well as lexical and syntactic information, we applied a conditional random field or a maximum-entropy classifier to predict whether a dropped personal pronoun immediately preceded each word and, if so, the person number of the dropped pronoun. We conducted a series of experiments using a manually annotated corpus of Chinese Short Message Service. Our approaches substantially outperformed a rule-based approach based partially on rules developed by Chung and Gildea (2010, Effects of Empty Categories on Machine Translation.Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics. pp. 636–45). Our approaches also outperformed (though by a considerably smaller margin) a machine-learning approach based closely on work by Yang, Liu, and Xue in (2015, Recovering Dropped Pronouns from Chinese Text Messages.Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics (ACL). Association for Computational Linguistics. pp. 309–13). Features derived from parsing largely did not help our approaches. We conclude that, given independent clause start information, the parse information we used was largely superfluous for identifying dropped personal pronouns.
APA, Harvard, Vancouver, ISO, and other styles
4

Intisar, Al-Mejibli1 Martin Colley2 and Salah Al-Majeed3. "NETWORKS UTILIZATION IMPROVEMENTS FOR SERVICE DISCOVERY PERFORMANCE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 1, November (2018): 01–17. https://doi.org/10.5281/zenodo.1451182.

Full text
Abstract:
Service discovery requests’ messages have a vital role in sharing and locating resources in many of service discovery protocols. Sending more messages than a link can handle may cause congestion and loss of messages which dramatically influences the performance of these protocols. Re-send the lost messages result in latency and inefficiency in performing the tasks which user(s) require from the connected nodes. This issue become a serious problem in two cases: first, when the number of clients which performs a service discovery request is increasing, as this result in increasing in the number of sent discovery messages; second, when the network resources such as bandwidth capacity are consumed by other applications. These two cases lead to network congestion and loss of messages. This paper propose an algorithm to improve the services discovery protocols performance by separating each consecutive burst of messages with a specific period of time which calculated regarding the available network resources. It was tested when the routers were connected in two configurations; decentralised and centralised .In addition, this paper explains the impact of increasing the number of clients and the consumed network resources on the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
5

Kluss, Benedikt, Samaneh Rashidibajgan, and Thomas Hupperich. "Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 75. http://dx.doi.org/10.3390/jsan11040075.

Full text
Abstract:
Opportunistic networks are an enabler technology for typologies without centralized infrastructure. Portable devices, such as wearable and embedded mobile systems, send relay messages to the communication range devices. One of the most critical challenges is to find the optimal route in these networks while at the same time preserving privacy for the participants of the network. Addressing this challenge, we presented a novel routing algorithm based on device clusters, reducing the overall message load and increasing network performance. At the same time, possibly identifying information of network nodes is eliminated by cloaking to meet privacy requirements. We evaluated our routing algorithm in terms of efficiency and privacy in opportunistic networks of traditional and structured cities, i.e., Venice and San Francisco by comparing our approach against the PRoPHET, First Contact, and Epidemic routing algorithms. In the San Francisco and Venice scenarios, Blossom improves messages delivery probability and outperforms PRoPHET, First Contact, and Epidemic by 46%, 100%, and 160% and by 67%, 78%, and 204%, respectively. In addition, the dropped messages probability in Blossom decreased 83% compared to PRoPHET and Epidemic in San Francisco and 91% compared to PRoPHET and Epidemic in Venice. Due to the small number of messages generated, the network overhead in this algorithm is close to zero. The network overhead can be significantly reduced by clustering while maintaining a reliable message delivery.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad, Farhan, Asma Adnane, Virginia Franqueira, Fatih Kurugollu, and Lu Liu. "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies." Sensors 18, no. 11 (2018): 4040. http://dx.doi.org/10.3390/s18114040.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses.
APA, Harvard, Vancouver, ISO, and other styles
7

Patil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.

Full text
Abstract:
<p>Adaptive transport technologies based on vehicular ad hoc networks (VANET) has proven considerable potential in light of the developing expansion of driver assistance and automobile telecommunication systems. However, confidentiality and safety are the vital challenges in vehicular ad hoc networks which could be seriously impaired by malicious attackers. While protecting vehicle privacy from threats, it is imperative to stop internal vehicles from putting out bogus messages. Considering these issues, a novel machine learning based message authentication combined with blockchain and inter planetary file system (IPFS) is proposed to achieve message dissemination in a secured way. Blockchain is the emerging technology which attempts to solve these problems by producing tamper proof events of records in a distributed environment and inter planetary file system used in the framework is a protocol designed to store the event with content addressability. Along with this combined technology, the source metadata information collected from the inter planetary file system is stored via a smart contract and uploaded to the distributed ledger technology (DLT). For performing event authentication, K-means clustering and support vector machine (SVM) classifier is employed in this framework. K-means clustering performs clustering of vehicles and it is marked malicious or not malicious. After clustering, support vector machine classifier detects the malicious event messages. By this way, the malicious messages are identified and it is dropped. Only the secure messages are forwarded in the network. Finally, our approach is capable of creating a safe and decentralized vehicular ad hoc network architecture with accountability and confidentiality through theoretical study and simulations.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Колмогорова, С. С., та И. В. Захаров. "Реализация технологии «издатель/подписчик» для организации взаимодействия движущихся и стационарных объектов". Vestnik of Volga State University of Technology. Series Radio Engineering and Infocommunication Systems, № 3(63) (14 листопада 2024): 43–52. https://doi.org/10.25686/2306-2819.2024.3.43.

Full text
Abstract:
В статье рассматривается организация фрагмента технологической сети передачи данных между мобильными и неподвижными объектами в системе сбора данных с сенсорных элементов. В основе рассматриваемого фрагмента сети лежит обмен информационными и командными сообщениями по беспроводным каналам передачи данных между пунктом управления и стационарными, мобильными объектами в двухстороннем порядке. В качестве возможного решения рассматривается технология «издатель/подписчик». По результатам проведённого исследования выбран наиболее подходящий брокер сообщений (RabbitMQ) под задачи связи мобильных и стационарных объектов в системе сбора и передачи данных. Introduction.Publisher-Subscriber technology is an effective tool for organizing real-time interactions between moving and stationary objects, as well as facilitating asynchronous message exchange between system components. The aim of the research was to improve the efficiency and reliability of communication between moving and stationary objects for use in robotic systems (RTS). The paper discusses the most popular implementations of Publisher-Subscriber technology, including SocketIO-based brokers, hbmqtt, Mosquitto, and RabbitMQ. The study evaluates the computational resources consumed by these implementations, specifically RAM usage, CPU utilization, and client connection times to the brokers. Findings. Implementation results for the RabbitMQ broker: RAM consumption was 86 MB, and CPU utilization was 0%. For the Mosquitto broker, RAM consumption was 6 MB, and CPU utilization was 0%. The SocketIO-based broker consumed 32 MB of RAM, with 0% CPU utilization. The hbmqtt-based broker used 30 MB of RAM and 0% CPU. The following results demonstrate resource consumption under load. RabbitMQ: RAM consumption was 94 MB, with CPU utilization at 14.3%. The message sending rate was 4,000 messages/second. During the first 15 seconds, latency increased but then dropped to minimal levels, and the broker delivered all subsequent messages with minimal latency. Mosquitto: RAM consumption was 12 MB, with CPU utilization at 17%. The message sending rate was 18,000 messages/second. At 54,000 messages/second, latency exceeded 18 seconds. SocketIO: RAM consumption was 34 MB, with CPU utilization at 3.3%. The message sending rate was 36,000 messages/second. Latency gradually increased, with a 99.8% message loss. hbmqtt: RAM consumption was 60 MB, with CPU utilization at 99.7%. The message sending rate was 20,000 messages/second. At 60,000 messages/second, latency increased to 45 seconds. Conclusion. It is quite clear from the data that the RabbitMQ broker demonstrates the best performance. Although, it has a limitation of 4,000 messages per second, this does not hinder message passing. Instead, it helps minimize delays and reduces system load. RabbitMQ also offers functionality that is either absent or difficult to implement in the other brokers evaluated. Practical significance. The results can be applied to further implement Publisher-Subscriber technology for organizing interactions between moving and stationary objects, with the potential for scaling these interactions in RTS.
APA, Harvard, Vancouver, ISO, and other styles
9

Shahariar, Rezvi, and Abu Naser. "Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node." Dhaka University Journal of Science 62, no. 2 (2015): 141–45. http://dx.doi.org/10.3329/dujs.v62i2.21979.

Full text
Abstract:
In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node’s total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node’s energy level reduces to critical energy level. DOI: http://dx.doi.org/10.3329/dujs.v62i2.21979 Dhaka Univ. J. Sci. 62(2): 141-145, 2014 (July)
APA, Harvard, Vancouver, ISO, and other styles
10

Stark, Elisabeth, and Aurélia Robert-Tissot. "Subject drop in Swiss French text messages." Linguistic Variation 17, no. 2 (2017): 251–71. http://dx.doi.org/10.1075/lv.14020.sta.

Full text
Abstract:
Abstract In this paper, we present evidence in favour of a syntactic approach to subject drop in Swiss French text messages. Subject drop in our corpus follows patterns found in various so-called "written abbreviated registers" such as diaries, notes etc.: it occurs at the beginning of main sentences and after preposed adjuncts. Based on a corpus of 1100 text messages, collected in 2009/10 (www.sms4science.ch), we test predictions put forward by two approaches to argument drop in abbreviated registers, i.e. the "Avoid Weak Start" hypothesis by Weir (2012a) and the "Truncated CP hypothesis" by Haegeman (2013). While for our data the first approach cannot be excluded, our results more strongly support the syntactic one, despite the fact that some data, especially preposed strong subject moi without clitic resumption, challenge existing analyses. These data suggest that dropped referential subjects can be analysed as instances of familiar topic drop.
APA, Harvard, Vancouver, ISO, and other styles
11

S Patel, Pravesh, Hemal Shah, and Yogeshwar Kosta. "CHBR: Contact History Based Routing in Time Varying Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 2 (2014): 4237–47. http://dx.doi.org/10.24297/ijct.v13i2.2911.

Full text
Abstract:
In Delay tolerant network having intermittent connectivity so there is no guarantee of finding a complete communication path that connecting the source and destination. There no any end to end connectivity for delay-tolerant network selection of routing protocol is important to deliver the message in an efficient way and increases chance to deliver a message to the destination. Some existing routing protocols improve the delivery ratio but it also increases the overhead. Our paper proposed Contact History Based Routing (CHBR) that use Neighborhood Index and Time varying properties such as temporal distance, Temporal Diameter and centrality for benchmarking the existing routing protocol. First, temporal metrics are evaluated for synthetic and real trace data. Then CHBR protocol is compared with the Epidemic and PROPHET for delivery ratio, overhead and the number of messages dropped. This has been carried using Opportunistic Network Environment simulator under real and synthetic datasets.
APA, Harvard, Vancouver, ISO, and other styles
12

Holmgren, A. Jay, N. Lance Downing, Mitchell Tang, Christopher Sharp, Christopher Longhurst, and Robert S. Huckman. "Assessing the impact of the COVID-19 pandemic on clinician ambulatory electronic health record use." Journal of the American Medical Informatics Association 29, no. 3 (2021): 453–60. http://dx.doi.org/10.1093/jamia/ocab268.

Full text
Abstract:
Abstract Objective The COVID-19 pandemic changed clinician electronic health record (EHR) work in a multitude of ways. To evaluate how, we measure ambulatory clinician EHR use in the United States throughout the COVID-19 pandemic. Materials and Methods We use EHR meta-data from ambulatory care clinicians in 366 health systems using the Epic EHR system in the United States from December 2019 to December 2020. We used descriptive statistics for clinician EHR use including active-use time across clinical activities, time after-hours, and messages received. Multivariable regression to evaluate total and after-hours EHR work adjusting for daily volume and organizational characteristics, and to evaluate the association between messages and EHR time. Results Clinician time spent in the EHR per day dropped at the onset of the pandemic but had recovered to higher than prepandemic levels by July 2020. Time spent actively working in the EHR after-hours showed similar trends. These differences persisted in multivariable models. In-Basket messages received increased compared with prepandemic levels, with the largest increase coming from messages from patients, which increased to 157% of the prepandemic average. Each additional patient message was associated with a 2.32-min increase in EHR time per day (P < .001). Discussion Clinicians spent more total and after-hours time in the EHR in the latter half of 2020 compared with the prepandemic period. This was partially driven by increased time in Clinical Review and In-Basket messaging. Conclusions Reimbursement models and workflows for the post-COVID era should account for these demands on clinician time that occur outside the traditional visit.
APA, Harvard, Vancouver, ISO, and other styles
13

Van Der Feen De Lille, J. Cornelie J. F., Marijke Riedstra, Wendy Hardeman, et al. "Fat Watch: A Nationwide Campaign in the Netherlands to Reduce Fat Intake—Process Evaluations." Nutrition and Health 12, no. 2 (1998): 107–17. http://dx.doi.org/10.1177/026010609801200203.

Full text
Abstract:
Fat Watch was a four-year campaign carried out in cooperation with retailers and industry, aiming at a reduction of fat consumption by 10% among the Dutch population. Mass media and supermarkets were the main conveyers of the message. Supermarkets participated well in the first (53%) and in the third year (51%), but to a lesser extent in the second year (36%). Campaign awareness in the target group (household shoppers for food) was relatively high in the first year (60%), but dropped in the next two years (40% and 32%, respectively). Combined with prominent mass media messages and with promotional activities of food products by suppliers, supermarkets seem a good channel for dissemination of nutrition information. Fat Watch has proved that cooperation of governmental, industrial and retail organizations for several years with respect to nutrition education activities is possible in the Netherlands.
APA, Harvard, Vancouver, ISO, and other styles
14

Khan, Waqas Imran, Asim Khurshid, and Sidra Anjum. "Outcome of Text messaging on glycemic control in children with type 1 diabetes mellitus: A Single Group Pre and Post intervention Study." Professional Medical Journal 28, no. 05 (2021): 661–65. http://dx.doi.org/10.29309/tpmj/2021.28.02.5107.

Full text
Abstract:
Objectives: The objective of this study is to find the outcome of text messaging on glycemic control in children with type1 DM. Study Design: Prospective Single Group Pre- and Post-intervention study. Setting: Diabetic Clinic of Department of Pediatric Endocrinology at The Children hospital and the Institute of Child Health, (CH & ICH) Multan. Period: October 2019 to December 2019. Material & Methods: Forty nine children and adolescents of 10-15 years old with T1DM were included in this study after taking informed consent from patient or their caregivers. Text messages were sent 5 times per week to patients/parents in simple Urdu language about diabetes education and Interactive message was sent weekly about blood sugar monitoring and insulin dose modification. To make sure patients are receiving text messages, phone calls were made regularly. Results: Among diabetic children 24 (49%) were males. The age ranged from 10-15 years and mean age was 12.6 ± 1.8 years. Mean duration of diabetes was 4.7± 2.8 years. Before intervention fasting and post prandial blood glucose levels per month were 160.4 mg/dl and 190 mg/dl respectively. After 12 weeks of text messaging fasting and post prandial blood glucose levels significantly (p-value < 0.001) dropped to 135.2 mg/dl and 170 mg/dl respectively. Similarly, HbA1C level decreased from 10% to 9% after intervention with p value of <0.001. Similar significant improvement was seen in frequency of hypoglycemic/hyperglycemic episode, missed insulin doses and frequency of hospital admissions. Conclusion: Our study showed a significant improvement in glycemic control and diabetes case management by diabetic educational and interactive text messages.
APA, Harvard, Vancouver, ISO, and other styles
15

Singh, Jagdeep, Sanjay Kumar Dhurandher, Isaac Woungang, and Han-Chieh Chao. "Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks." Sensors 24, no. 23 (2024): 7650. https://doi.org/10.3390/s24237650.

Full text
Abstract:
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the probability density function of the beta distribution and some contextual factors, to dynamically compute the trust and reputation values of nodes, leading to efficient data dissemination, where malicious nodes are effectively identified and bypassed during that process. Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Woojun, Myungsik Cho, and Youngchul Sung. "Message-Dropout: An Efficient Training Method for Multi-Agent Deep Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 6079–86. http://dx.doi.org/10.1609/aaai.v33i01.33016079.

Full text
Abstract:
In this paper, we propose a new learning technique named message-dropout to improve the performance for multi-agent deep reinforcement learning under two application scenarios: 1) classical multi-agent reinforcement learning with direct message communication among agents and 2) centralized training with decentralized execution. In the first application scenario of multi-agent systems in which direct message communication among agents is allowed, the messagedropout technique drops out the received messages from other agents in a block-wise manner with a certain probability in the training phase and compensates for this effect by multiplying the weights of the dropped-out block units with a correction probability. The applied message-dropout technique effectively handles the increased input dimension in multi-agent reinforcement learning with communication and makes learning robust against communication errors in the execution phase. In the second application scenario of centralized training with decentralized execution, we particularly consider the application of the proposed messagedropout to Multi-Agent Deep Deterministic Policy Gradient (MADDPG), which uses a centralized critic to train a decentralized actor for each agent. We evaluate the proposed message-dropout technique for several games, and numerical results show that the proposed message-dropout technique with proper dropout rate improves the reinforcement learning performance significantly in terms of the training speed and the steady-state performance in the execution phase.
APA, Harvard, Vancouver, ISO, and other styles
17

Al-Shareeda, Mahmood A., and Selvakumar Manickam. "Man-In-The-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation." Symmetry 14, no. 8 (2022): 1543. http://dx.doi.org/10.3390/sym14081543.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, and in Internet of Things (IoT) ecosystems. They are also anticipated to play an increasingly significant role in the future of the Internet due to the strong evolution of wireless technology in recent years. Nevertheless, this inter-node communication is vulnerable to various security attacks such as Man-In-The-Middle (MITM) attacks, which are considered to be the main challenge in MANETs. This happens when a harmful node intercepts data shared by legal nodes. Therefore, the main goal of this work is to investigate the impact of attackers’ strategies to execute MITM assaults in MANETs, such as message-delayed and message-dropped assaults. The output of this work shows that these assaults have a severe impact on legal entities in MANETs as the network experiences a high number of compromised messages as well as high E2ED and PLD. Finally, by using symmetry or asymmetry cryptographies, our proposal will avoid MITM attacks that intercept the communication between legal nodes.
APA, Harvard, Vancouver, ISO, and other styles
18

Das, Ankush, Di Wang, and Jan Hoffmann. "Probabilistic Resource-Aware Session Types." Proceedings of the ACM on Programming Languages 7, POPL (2023): 1925–56. http://dx.doi.org/10.1145/3571259.

Full text
Abstract:
Session types guarantee that message-passing processes adhere to predefined communication protocols. Prior work on session types has focused on deterministic languages but many message-passing systems, such as Markov chains and randomized distributed algorithms, are probabilistic. To implement and analyze such systems, this article develops the meta theory of probabilistic session types with an application focus on automatic expected resource analysis. Probabilistic session types describe probability distributions over messages and are a conservative extension of intuitionistic (binary) session types. To send on a probabilistic channel, processes have to utilize internal randomness from a probabilistic branching or external randomness from receiving on a probabilistic channel. The analysis for expected resource bounds is smoothly integrated with the type system and is a variant of automatic amortized resource analysis. Type inference relies on linear constraint solving to automatically derive symbolic bounds for various cost metrics. The technical contributions include the meta theory that is based on a novel nested multiverse semantics and a type-reconstruction algorithm that allows flexible mixing of different sources of randomness without burdening the programmer with complex type annotations. The type system has been implemented in the language NomosPro with linear-time type checking. Experiments demonstrate that NomosPro is applicable in different domains such as cost analysis of randomized distributed algorithms, analysis of Markov chains, probabilistic analysis of amortized data structures and digital contracts. NomosPro is also shown to be scalable by (i) implementing two broadcast and a bounded retransmission protocol where messages are dropped with a fixed probability, and (ii) verifying the limiting distribution of a Markov chain with 64 states and 420 transitions.
APA, Harvard, Vancouver, ISO, and other styles
19

St. Amour, Ben, and Arunita Jaekel. "Data Rate Selection Strategies for Periodic Transmission of Safety Messages in VANET." Electronics 12, no. 18 (2023): 3790. http://dx.doi.org/10.3390/electronics12183790.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) facilitate communication among vehicles and possess designated infrastructure nodes to improve road safety and traffic flow. As the number of vehicles increases, the limited bandwidth of the wireless channel used for vehicle-to-vehicle (V2V) communication can become congested, leading to packets being dropped or delayed. VANET congestion control techniques attempt to address this by adjusting different transmission parameters, including the data rate, message rate, and transmission power. In this paper, we propose a decentralized congestion control algorithm where each factor adjusts the data rate (bitrate) used to transmit its wireless packet congestion based on the current load on the channel. The channel load is estimated independently by each vehicle using the measured channel busy ratio (CBR). The simulation results demonstrate that the proposed approach outperforms existing data rate-based algorithms, in terms of both packet reception and overall channel load.
APA, Harvard, Vancouver, ISO, and other styles
20

Borrelli, Belinda, Michelle Henshaw, Romano Endrighi, et al. "An Interactive Parent-Targeted Text Messaging Intervention to Improve Oral Health in Children Attending Urban Pediatric Clinics: Feasibility Randomized Controlled Trial." JMIR mHealth and uHealth 7, no. 11 (2019): e14247. http://dx.doi.org/10.2196/14247.

Full text
Abstract:
Background Effective preventive treatments for dental decay exist, but caries experience among preschoolers has not changed, with marked disparities in untreated decay. Despite near-universal use of SMS text messaging, there are no studies using text messages to improve the oral health of vulnerable children. Objective This randomized controlled feasibility trial aimed to test the effects of oral health text messages (OHT) versus a control (child wellness text messages or CWT). OHT was hypothesized to outperform CWT on improving pediatric oral health behaviors and parent attitudes. Methods Parents with a child aged <7 years were recruited at urban clinics during pediatric appointments (79% [41/52] below poverty line; 66% [36/55] black) and randomized to OHT (text messages on brushing, dental visits, bottle and sippy cups, healthy eating and sugary beverages, and fluoride) or CWT (text messages on reading, safety, physical activity and development, secondhand smoke, and stress) groups. Automated text messages based on Social Cognitive Theory were sent twice each day for 8-weeks. Groups were equivalent on the basis of the number of text messages sent, personalization, interactivity, and opportunity to earn electronic badges and unlock animated characters. Assessments were conducted at baseline and 8 weeks later. Data were analyzed with linear mixed–effects models. Results A total of 55 participants were randomized (28 OHT and 27 CWT). Only one participant dropped out during the text message program and 47 (24 OHT and 23 CWT) completed follow up surveys. Response rates exceeded 68.78% (1040/1512) and overall program satisfaction was high (OHT mean 6.3; CWT mean 6.2; 1-7 scale range). Of the OHT group participants, 84% (21/25) would recommend the program to others. Overall program likeability scores were high (OHT mean 5.90; CWT mean 6.0; 1-7 scale range). Participants reported high perceived impact of the OHT program on brushing their child’s teeth, motivation to address their child's oral health, and knowledge of their child's oral health needs (mean 4.7, 4.6, and 4.6, respectively; 1-5 scale range). At follow up, compared with CWT, OHT group participants were more likely to brush their children’s teeth twice per day (odds ratio [OR] 1.37, 95% CI 0.28-6.50) and demonstrated improved attitudes regarding the use of fluoride (OR 3.82, 95% CI 0.9-16.8) and toward getting regular dental checkups for their child (OR 4.68, 95% CI 0.24-91.4). There were modest, but not significant, changes in motivation (F1,53=0.60; P=.45) and self–efficacy (F1,53=0.24; P=.63) to engage in oral health behaviors, favoring OHT (d=0.28 and d=0.16 for motivation and self–efficacy, respectively). Conclusions The OHT program demonstrated feasibility was well utilized and appealing to the target population and showed promise for efficacy.
APA, Harvard, Vancouver, ISO, and other styles
21

Uhrig Castonguay, Breana J., Andrew E. Cressman, Irene Kuo, et al. "The Implementation of a Text Messaging Intervention to Improve HIV Continuum of Care Outcomes Among Persons Recently Released From Correctional Facilities: Randomized Controlled Trial." JMIR mHealth and uHealth 8, no. 2 (2020): e16220. http://dx.doi.org/10.2196/16220.

Full text
Abstract:
Background Previously incarcerated individuals have suboptimal linkage and engagement in community HIV care. Mobile health (mHealth) interventions have been shown to be effective in addressing these gaps. In Washington, District of Columbia (DC), we conducted a randomized trial of an SMS text messaging–based mHealth intervention (CARE+ Corrections) to increase linkage to community HIV care and antiretroviral treatment adherence among HIV-infected persons involved in the criminal justice system. Objective This study aimed to describe the SMS text messaging–based intervention, participant use of the intervention, and barriers and facilitators of implementation. Methods From August 2013 to April 2015, HIV-positive incarcerated individuals were recruited within the DC Department of Corrections, and persons released in the past 6 months were recruited within the community via street-based recruitment, community partnerships, and referrals. Participants were followed for 6 months and received weekly or daily SMS text messages. Formative research resulted in the development of the content of the messages in 4 categories: HIV Appointment Reminders, Medication Adherence, Prevention Reminders, and Barriers to Care following release from jail. Participants could customize the timing, frequency, and message content throughout the study period. Results Of the 112 participants enrolled, 57 (50.9%) were randomized to the intervention group and 55 (49.1%) to the control group; 2 control participants did not complete the baseline visit, and were dropped from the study, leaving a total of 110 participants who contributed to the analyses. Study retention was similar across both study arms. Median age was 42 years (IQR 30-50), 86% (49/57) were black or African American, 58% (33/57) were male, 25% (14/57) were female, and 18% (10/57) were transgender. Median length of last incarceration was 4 months (IQR 1.7-9.0), and median lifetime number of times incarcerated was 6.5 (IQR 3.5-14.0). Most participants (32/54, 59%) had a baseline viral load of <200 copies/mL. Nearly all participants (52/57, 91%) chose to use a cell phone provided by the study. The most preferred Appointment Reminder message was Hey how you feeling? Don’t forget to give a call and make your appointment (19/57, 33%). The most preferred Medication Adherence message was Don’t forget your skittles! (31/57, 54%), and 63% (36/57) of participants chose to receive daily (vs weekly) messages from this category at baseline. The most preferred Prevention Reminder message was Stay strong. Stay clean (18/57, 32%). The most preferred Barriers to Care message was Holla at your case manager, they’re here to help (12/57, 22%). Minor message preference differences were observed among participants enrolled in the jail versus those from the community. Conclusions Participants’ ability to customize their SMS text message plan proved helpful. Further large-scale research on mHealth platforms is needed to assess its efficacy among HIV-infected persons with a history of incarceration. Trial Registration ClinicalTrials.gov NCT01721226; https://clinicaltrials.gov/ct2/show/NCT01721226
APA, Harvard, Vancouver, ISO, and other styles
22

Chaiuk, Tetyana A., Iryna O. Alyeksyeyeva, Oksana V. Borysovych, Kateryna S. Karpova, and Olena V. Gayevska. "Celebrities and Microcelebrities in Quarantine: Strategies of Parasocial Communication." Academic Journal of Interdisciplinary Studies 10, no. 5 (2021): 26. http://dx.doi.org/10.36941/ajis-2021-0121.

Full text
Abstract:
The research applies the relationship strategies and the image repair strategies frameworks to study and compare celebrities and microcelebrities’ communicative activity on social media during the lockdown in the USA and the UK in spring, 2020. For celebrities, the sample collected on social media in March – April, 2020, reveals qualitative changes: in the quarantine, first-rank celebrities attempted to reduce the assumed gap between themselves and their fans by using the strategies typically associated with microcelebrities, namely openness, positivity, task sharing, and assurance. If applied inappropriately, these strategies damaged the celebrities’ image and the famous chose either to take corrective actions or to ignore the communication failure. The microcelebrities’ messages during the lockdown did not show any qualitative shift: they held on to their typical openness, assurance and task sharing relationship maintenance strategies. Yet, the posts, where some microcelebrities, pursuing the openness strategy, sincerely reported their neglect of the quarantine restrictions, were more destructive to their image than similar posts from celebrities. The negative feedback affected microcelebrities communication on social media quantitatively and qualitatively: the number of messages dropped and the bloggers employed an extensive set of strategies to repair their image. Received: 3 June 2021 / Accepted: 26 July 2021 / Published: 5 September 2021
APA, Harvard, Vancouver, ISO, and other styles
23

Nourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.

Full text
Abstract:
Wireless networks are susceptible to many security problems since the wireless medium is open. Jammer (jamming attack) is the most important problems in wireless networks. It is denial-of-service attack in which attackers send malicious signals or messages on a channel that is intended for normal traffic by intentionally interfering with the network. One of the solutions is the development of tunneling technology as an attempt to secure communication networks. Virtual Private Network (VPN) tunneling technology when integrated with firewall would provide a suitable security. In this study, number of Jammers would interfere with the normal operation of the network resulting in performance degradation of network. These Jammers decrease throughput and increase delay and data dropped. The aim of this study is to improve the performance of Wireless Local Area Network (WLAN) by integrating Firewall with VPN in number of different Riverbed Modeler simulation scenarios which it is utilized in this study for video and data applications. Firewall is a technology employed to regulate the level of network connectivity. It can block unauthorized access from an external network to an internal network’s resources. In this study, the tunneling technology of VPN was integrated with firewall to improve the performance by increasing the throughput and decreasing delay and data dropped. The firewall would block any access to the server from the workstations and the VPN would filter the packets to allow a specific access to the specific server. The results showed that VPN when integrated with firewall increased the throughput from 1,350,000 to 1,500,000 bits/sec and decreased the delay from 0.0054 sec to 0.0047 sec and data dropped from 7,800 to 5,000 bits/sec so that this study proved that VPN incorporated with firewall provides a good throughput and delay improvement for wireless local area network.
APA, Harvard, Vancouver, ISO, and other styles
24

Plyukhin, Dan, Gul Agha, and Fabrizio Montesi. "CRGC: Fault-Recovering Actor Garbage Collection in Pekko." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 945–69. https://doi.org/10.1145/3729288.

Full text
Abstract:
Actors are lightweight reactive processes that communicate by asynchronous message-passing. Actors address common problems like concurrency control and fault tolerance, but resource management remains challenging: in all four of the most popular actor frameworks (Pekko, Akka, Erlang, and Elixir) programmers must explicitly kill actors to free up resources. To simplify resource management, researchers have devised actor garbage collectors (actor GCs) that monitor the application and detect when actors are safe to kill. However, existing actor GCs are impractical for distributed systems where the network is unreliable and nodes can fail. The simplest actor GCs do not collect cyclic garbage, whereas more sophisticated actor GCs are not fault-recovering : dropped messages and crashed nodes can cause actors to become garbage that never gets collected. We present Conflict-free Replicated Garbage Collection (CRGC): the first fault-recovering cyclic actor GC. In CRGC, actors and nodes record information locally and broadcast updates to the garbage collectors running on each node. CRGC does not require locks, explicit memory barriers, or any assumptions about message delivery order, except for reliable FIFO channels from actors to their local garbage collector. Moreover, CRGC is simple: we concisely present its operational semantics, which has been formalized in TLA + , and prove both soundness (non-garbage actors are never killed) and completeness (all garbage actors are eventually killed, under reasonable assumptions). We also present a preliminary implementation in Apache Pekko and measure its performance using two actor benchmark suites. Our results show the performance overhead of CRGC is competitive with simpler approaches like weighted reference counting, while also being much more powerful.
APA, Harvard, Vancouver, ISO, and other styles
25

Biggs, Jennifer, Nnamdi Njoku, Kaitlyn Kurtz, and Ayan Omar. "Decreasing Missed Appointments at a Community Health Center: A Community Collaborative Project." Journal of Primary Care & Community Health 13 (January 2022): 215013192211068. http://dx.doi.org/10.1177/21501319221106877.

Full text
Abstract:
Introduction: Missed appointments are a problem for health care systems, causing lost revenue and concern for poor health outcomes. This is particularly true at Community Health Centers (CHCs), where clients may already face substantial barriers to optimal care and outcomes. Identified solutions to this problem are limited, and often focus on reminder calls and messages to clients. Methods: This project utilized a unique academic/CHC collaboration to investigate and initiate solutions to their high missed appointment rates. Client phone calls to determine clinic specific needs, monthly team meetings to brainstorm and choose initiatives, engaging stake holders, and phased implementation were the tools used to address the high missed appointment rates within the limitations of the clinic resources available. Results: Within one quarter, missed appointment rates at the clinic dropped by 6%-17% for different appointment types. Conclusion: While the project was interrupted due to the pandemic, early outcomes were promising and the model may be helpful to other CHCs with similar concerns.
APA, Harvard, Vancouver, ISO, and other styles
26

Caglar Koca, Meltem Civas, and Ozgur B. Akan. "Evolutionary game theoretic resource allocation simulation for molecular communication." ITU Journal on Future and Evolving Technologies 2, no. 3 (2021): 111–19. http://dx.doi.org/10.52953/bwpi5246.

Full text
Abstract:
Molecular Communication (MC) is an emerging technology using molecules to transfer information between nanomachines. In this paper, we approach the resource allocation problem in Molecular Nano-networks (MCN) from the perspective of evolutionary game theory. In particular, we consider an MCN as an organism having three types of nodes acting as a sensor, relay, and sink, respectively. The resources are distributed among the nodes according to an evolutionary process, which relies on the selection of the most successful organisms followed by creating their offspring iteratively. In this regard, the success of an organism is measured by the total number of dropped messages during its life cycle. To illustrate the evolution procedure, we design a toy problem, and then solve it analytically and using the evolution approach for comparison. We further simulate the performance of the evolution approach on randomly generated organisms. The results reveal the potential of evolutionary game theory tools to improve the transmission performance of MCNs.
APA, Harvard, Vancouver, ISO, and other styles
27

Swoboda, Jennifer C., Patricia W. Kilduff, and Joshua P. Katz. "A Platoon Level Model of Communication Flow and the Effects on Soldier Performance." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 12 (2005): 1210–14. http://dx.doi.org/10.1177/154193120504901224.

Full text
Abstract:
The Future Combat System (FCS) initiative is at the center of the Army's Future Force Vision. To predict how proposed systems and displays will impact situational understanding and, thereby, decision making, the U.S. Army Research Laboratory Human Research and Engineering Directorate (ARL HRED) used the tool, Command, Control, and Communication: Techniques for Reliable Assessment of Concept Execution (C3TRACE). C3TRACE is a modeling environment in which one can develop multiple concept configurations quickly and efficiently, minimizing the need for multiple human-in-the-loop experiments. Among the performance measures tracked are operator utilization, completed versus dropped messages, and the probability of making a “good” decision, that is, a decision supported by the required information. C3TRACE was used to develop a model of a Future Combat System (FCS) platoon equipment concept—–wrist-mounted displays for the dismounted positions and laptop-type displays for the mounted positions. This paper discusses the effects of display device communication processing on Soldier performance in mounted vs. dismounted positions.
APA, Harvard, Vancouver, ISO, and other styles
28

Carrasco-Hernandez, Laura, Francisco Jódar-Sánchez, Francisco Núñez-Benjumea, et al. "A Mobile Health Solution Complementing Psychopharmacology-Supported Smoking Cessation: Randomized Controlled Trial." JMIR mHealth and uHealth 8, no. 4 (2020): e17530. http://dx.doi.org/10.2196/17530.

Full text
Abstract:
Background Smoking cessation is a persistent leading public health challenge. Mobile health (mHealth) solutions are emerging to improve smoking cessation treatments. Previous approaches have proposed supporting cessation with tailored motivational messages. Some managed to provide short-term improvements in smoking cessation. Yet, these approaches were either static in terms of personalization or human-based nonscalable solutions. Additionally, long-term effects were neither presented nor assessed in combination with existing psychopharmacological therapies. Objective This study aimed to analyze the long-term efficacy of a mobile app supporting psychopharmacological therapy for smoking cessation and complementarily assess the involved innovative technology. Methods A 12-month, randomized, open-label, parallel-group trial comparing smoking cessation rates was performed at Virgen del Rocío University Hospital in Seville (Spain). Smokers were randomly allocated to a control group (CG) receiving usual care (psychopharmacological treatment, n=120) or an intervention group (IG) receiving psychopharmacological treatment and using a mobile app providing artificial intelligence–generated and tailored smoking cessation support messages (n=120). The secondary objectives were to analyze health-related quality of life and monitor healthy lifestyle and physical exercise habits. Safety was assessed according to the presence of adverse events related to the pharmacological therapy. Per-protocol and intention-to-treat analyses were performed. Incomplete data and multinomial regression analyses were performed to assess the variables influencing participant cessation probability. The technical solution was assessed according to the precision of the tailored motivational smoking cessation messages and user engagement. Cessation and no cessation subgroups were compared using t tests. A voluntary satisfaction questionnaire was administered at the end of the intervention to all participants who completed the trial. Results In the IG, abstinence was 2.75 times higher (adjusted OR 3.45, P=.01) in the per-protocol analysis and 2.15 times higher (adjusted OR 3.13, P=.002) in the intention-to-treat analysis. Lost data analysis and multinomial logistic models showed different patterns in participants who dropped out. Regarding safety, 14 of 120 (11.7%) IG participants and 13 of 120 (10.8%) CG participants had 19 and 23 adverse events, respectively (P=.84). None of the clinical secondary objective measures showed relevant differences between the groups. The system was able to learn and tailor messages for improved effectiveness in supporting smoking cessation but was unable to reduce the time between a message being sent and opened. In either case, there was no relevant difference between the cessation and no cessation subgroups. However, a significant difference was found in system engagement at 6 months (P=.04) but not in all subsequent months. High system appreciation was reported at the end of the study. Conclusions The proposed mHealth solution complementing psychopharmacological therapy showed greater efficacy for achieving 1-year tobacco abstinence as compared with psychopharmacological therapy alone. It provides a basis for artificial intelligence–based future approaches. Trial Registration ClinicalTrials.gov NCT03553173; https://clinicaltrials.gov/ct2/show/NCT03553173 International Registered Report Identifier (IRRID) RR2-10.2196/12464
APA, Harvard, Vancouver, ISO, and other styles
29

Kim, Ji Young. "Message strategies in smartphone patent battles." Journal of Communication Management 20, no. 3 (2016): 255–67. http://dx.doi.org/10.1108/jcom-10-2013-0072.

Full text
Abstract:
Purpose – The purpose of this paper is to examine the effects of message attributes on public opinion in regards to corporate reputation and communication intention. Design/methodology/approach – It conducted a 2×2 between-subject factorial experiment, manipulating media messages in terms of which company owns the patents, and the level of innovation emphasized through the companies’ marketing communication efforts. Findings – The two-way analysis of variance results showed that, for Samsung, the main effects of the two independent variables (ownership and innovation) were found on the perceived corporate reputation; while only a main effect of innovation capability attribute was found on the perceived secondary communication intention for Apple. Research limitations/implications – One main theoretical contribution of this current study is the exploration of the attribute level of agenda setting in the context of a business communication setting with an experimental study. Practical implications – This result would suggest that practitioners should focus on their marketing strategies as well when they are involved in a lawsuit case. When a company loses a lawsuit, the company’s perceived reputation is dropped; however, the dropping gap can be reduced when the company has been portrayed as an innovative leader in the market. Social implications – Combined together, market shares of the two companies exceed more than half of the smartphone vender sales, and they have set the standard in the smartphone industry. Hence, media and public pay great attention to the patent battles. Court rulings are not only survived in the courtroom, but the fight also took place in their marketing, communication, and public relations. Originality/value – This is an empirical experiment exploring a causal effect of message attributes on public opinion. The two companies in this study are the industry leaders and the case is current.
APA, Harvard, Vancouver, ISO, and other styles
30

Rahina, Nugrahani, Widiyatmoko Arif, Wibawanto Wandah, Arief Sandy, and Tiara Habib Aisyah Intan Noor. "A Utilization of Visual Communication Media to Enhance Community Participation in the Back to School Movement in Brebes Regency." International Journal of Social Science and Human Research 07, no. 05 (2024): 3278–85. https://doi.org/10.5281/zenodo.11357844.

Full text
Abstract:
Brebes Regency still has a relatively low HDI compared to other regencies in Central Java. One of the causes of the low HDI in Brebes Regency is the low level of education. According to data from the Central Statistics Agency (BPS) of Brebes Regency in 2020, the gross enrollment rate (APK) of children aged 7-12 years in Brebes Regency was 93.86%. This means that out of 100 children aged 7-12 years in Brebes Regency, only around 94 children attend school. Responding to these conditions, the Brebes Regency Government launched the Back to School Movement (GKB) to provide opportunities for children who have dropped out of school to continue their education. In implementing the GKB there are still obstacles, including limited infrastructure and human resources. Based on directions from the Brebes Regency DINDIKPORA, the service team was directed to provide training and assistance to the Education Care Community Forum (FMPP) in Sigambir Village, Brebes District, Brebes Regency in developing visual communication media, which can later be used to support the outreach activities of the Back to School Movement to various levels of society. The method for implementing service activities is designed using 4 activity stages, namely preliminary studies to identify needs, training in developing visual communication media, assistance with media implementation and evaluation. Visual communication media can increase effectiveness and efficiency in conveying socialization messages to a wider audience, make it easier to understand the message, and increase the audience's attractiveness and interaction with the message conveyed. Through this service activity, it is hoped that the Education Care Community Forum (FMPP) in Sigambir Village, Brebes District, can maximize its potential as an extension of the Brebes Regency Government in increasing community participation in the Back to School Movement in Brebes Regency.
APA, Harvard, Vancouver, ISO, and other styles
31

García Guerrero, José Luis. "Una visión de la libertad de comunicación desde la perspectiva de las diferencias entre la libertad de expresión, en sentido estricto, y la libertad de información." Teoría y Realidad Constitucional, no. 20 (January 1, 2007): 359. http://dx.doi.org/10.5944/trc.20.2007.6784.

Full text
Abstract:
The present Project contains a complete synthesis of the constitutional Spanish jurisprudence. The author considers that the right to freedom and the political rights are grouped around three or four genres. It identifies, between those, the freedom of communication that the constitutional assembly and the constitutional jurisprudence have extended to all sorts of activities. After this assumption, the project is focused on giving a view of the freedom of communication from the point of view of the differences between the freedom of information and the freedom of speech in a strict way. After defending a legal nature which protects all kinds of communications and which can be exercised by all sorts of chaps; it is rejected that the institutional offshoot explains the really different limitations that several messages introduce, wide restrictions regarding commercial speech or pornography and dropped ones regarding politics. The argument which is proposed for its justification is based on the different systematic connections that are originated between the constitutional rules by the different matter and the purpose pursued by the messages, and, when this yardstick is insufficient, it is complemented with the concept of relevance or public interest, the one which is pretended to be refined. The exercise of that freedom by journalists and maximizing the professional diligence reinforce the freedom of communication when it has to be pondered with other rights or constitutional goods. In Spain, the affair Terminello versus Chicago is considered as a worth yardstick to solve conflicts with the public order.
APA, Harvard, Vancouver, ISO, and other styles
32

Lin, Tingyi S. "Visual representation and communication." Information Design Journal 17, no. 3 (2009): 261–72. http://dx.doi.org/10.1075/idj.17.3.10lin.

Full text
Abstract:
There is great potential for graphics to present quantities, processes, and spatial relations that make knowledge communication more effective through simple to complex visual languages. Visual representation conveys certain messages, directly or metaphorically. An effective visual representation communicates with users by offering core messages and other embedded qualities. These embedded qualities generate interest in the topics/issues, create desirable energy for seeking more knowledge in depth, and enable readers to explore their favorable influences. It is no longer enough to consider a visual representation to be merely attractive or pleasing; it also has to be designed in a way to effectively tell stories in order to better play its role as an information carrier and to meet users’ needs for multiple modes of usage. This study examines the ways in which visual explanation both tells stories and presents their underlying meanings. Visual information design not only presents concepts and events across time but also disseminates information widely through various media. This case study investigates various visual depictions of fertility rates and observes the causes and effects of viewers’ decision making. The total fertility rates in Taiwan dropped dramatically from 1951 to 2006, according to the Department of Household Registration Affairs, Ministry of Interior (MOI), Taiwan. This drop not only will render the aging population greater than other age groups in the near future, but also greatly changes social, economic, and environmental progress in this region. This study’s small effort in the information design field will help create a link between practitioners’ intelligence and researchers’ suggestions, thereby helping enhance the effectiveness of visual communication.
APA, Harvard, Vancouver, ISO, and other styles
33

Panta, G. R., C. M. Parmentier, and L. J. Rowland. "Response of Dehydrins to Drought, Low Temperature, and ABA Treatment in Whole Plants and Cell Suspension Cultures of Blueberry." HortScience 33, no. 3 (1998): 517c—517. http://dx.doi.org/10.21273/hortsci.33.3.517c.

Full text
Abstract:
Previously, three dehydrins of 65, 60, and 14 kDa were identified as the predominant proteins present in cold-acclimated blueberry floral buds. Levels were shown to increase with cold acclimation and decrease with deacclimation and resumption of growth. Recently, a dehydrin cDNA clone was isolated and sequenced, and shown to hybridize to messages likely to encode all three dehydrins. In the present study, expression of dehydrins was examined in blueberry cultivars in response to drought and low-temperature treatment and in cell suspension cultures in response to low temperature and ABA treatment. During 32 days of drought stress, relative shoot water content dropped to 51% to 90%, depending upon cultivars. For cold stress experiments, cultivars with different chilling requirements and levels of cold hardiness were kept at 4 °C for 5 weeks. Cell suspension cultures were held at 4 °C for up to 2 weeks. For ABA experiment, ABA concentrations ranging from 10-3 to 10-7 M were used. Dehydrins were monitored in response to various treatments at RNA and proteins levels using the cDNA clone and antisera raised against the dehydrins. Interestingly, a previously uncharacterized 30 kDa dehydrin was found to be the major low temperature and ABA-responsive protein in cell suspension cultures.
APA, Harvard, Vancouver, ISO, and other styles
34

Appino, Perry A., J. Bryan Lewis, Lawrence Koved, Daniel T. Ling, David A. Rabenhorst, and Christopher F. Codella. "An Architecture for Virtual Worlds." Presence: Teleoperators and Virtual Environments 1, no. 1 (1992): 1–17. http://dx.doi.org/10.1162/pres.1992.1.1.1.

Full text
Abstract:
This paper presents a system architecture for creating interactive, multisensory, three-dimensional environments called virtual worlds. The architecture specifically addresses the requirements of virtual worlds for high performance, flexibility, and coordination of concurrent events. Performance is enhanced by a distributed client/server system structure and by efficient overlap of processing time and input/output delay. All processes communicate via asynchronous messages. The functional partitioning of a virtual world requires relatively low bandwidth among the individual processes and the system can be implemented over a conventional local-area network. A key element of this architecture is a central, event-driven dialogue manager that coordinates concurrent input and output events. The dialogue manager provides a clear separation of the interaction techniques from the content of the virtual world as defined by the application. The system is flexible and easily reconfigurable. An interaction technique can be readily changed or replaced because each interaction device is modularized into a separate server and each interaction modality into a separate subdialogue. Subdialogues can be loaded and dropped dynamically, enabling input/output device remapping and the selection of interaction techniques while a virtual world is running. As an initial test of this architecture we have implemented a virtual world for interacting with data from a computational fluid dynamics simulation.
APA, Harvard, Vancouver, ISO, and other styles
35

Rochet, Florentin, and Olivier Pereira. "Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols." Proceedings on Privacy Enhancing Technologies 2018, no. 2 (2018): 27–46. http://dx.doi.org/10.1515/popets-2018-0011.

Full text
Abstract:
AbstractThe design of Tor includes a feature that is common to most distributed systems: the protocol is flexible. In particular, the Tor protocol requires nodes to ignore messages that are not understood, in order to guarantee the compatibility with future protocol versions. This paper shows how to exploit this flexibility by proposing two new active attacks: one against onion services and the other against Tor clients.Our attack against onion services is a new low-cost side-channel guard discovery attack that makes it possible to retrieve the entry node used by an onion service in one day, without injecting any relay in the network. This attack uses the possibility to send dummy cells that are silently dropped by onion services, in accordance with the flexible protocol design, and the possibility to observe those cells by inspecting public bandwidth measurements, which act as a side channel.Our attack against Tor clients, called the dropmark attack, is an efficient 1-bit conveying active attack that correlates flows. Simulations performed in Shadow show that the attack succeeds with an overwhelming probability and with no noticeable impact on user performance.Finally, we open the discussion regarding a trade-off between flexibility and security in anonymous communication systems, based on what we learned within the scope of our attacks.
APA, Harvard, Vancouver, ISO, and other styles
36

Blaudeau, Clément, Didier Rémy, and Gabriel Radanne. "Avoiding Signature Avoidance in ML Modules with Zippers." Proceedings of the ACM on Programming Languages 9, POPL (2025): 1962–91. https://doi.org/10.1145/3704902.

Full text
Abstract:
We present ZipML, a new path-based type system for a fully fledged ML-module language that avoids the signature avoidance problem. This is achieved by introducing floating fields, which act as additional fields of a signature, invisible to the user but still accessible to the typechecker. In practice, they are handled as zippers on signatures, and can be seen as a lightweight extension of existing signatures. Floating fields allow to delay the resolution of instances of the signature avoidance problem as long as possible or desired. Since they do not exist at runtime, they can be simplified along type equivalence, and dropped once they became unreachable. We give four rules for the simplification of floating fields without loss of type-sharing and present an algorithm that implements those rules. Remaining floating fields may fully disappear at signature ascription, especially in the presence of toplevel interfaces. Residual unavoidable floating fields can be shown to the user as a last resort, improving the quality of error messages. Besides, ZipML implements early and lazy strengthening, as well as lazy inlining of definitions, preventing duplication of signatures inside the typechecker. The correctness of the type system is proved by elaboration into M𝜔 , which has itself been proved sound by translation to F𝜔. ZipML has been designed to be an improvement over OCaml that could be retrofitted into the existing implementation.
APA, Harvard, Vancouver, ISO, and other styles
37

Hoosen, Fatima, Mieke Faber, Johanna H. Nel, Nelia P. Steyn, and Marjanne Senekal. "Feasibility Testing of the Health4LIFE Weight Loss Intervention for Primary School Educators Living with Overweight/Obesity Employed at Public Schools in Low-Income Settings in Cape Town and South Africa: A Mixed Methods Study." Nutrients 16, no. 18 (2024): 3062. http://dx.doi.org/10.3390/nu16183062.

Full text
Abstract:
Given the high prevalence of overweight and obesity amongst educators, this study investigated the feasibility of the 16-week Health4LIFE weight loss intervention for primary school educators living with overweight/obesity in low-income settings in Cape Town, South Africa. The research comprised two sub-studies, a pilot randomised controlled trial testing the intervention (10 intervention, n = 79 and 10 control schools, n = 58), and an investigation of the perceptions of participating educators and principals. Feasibility outcomes included reach, applicability, acceptability, implementation integrity, and a hypothesis-generating signal of effect on lifestyle factors and weight. The intervention consisted of a wellness day, weight loss manual, and text messages. Results indicated acceptable reach, with positive feedback on intervention components from principals and educators. Implementation was largely successful, though three schools dropped out due to scheduling issues. Barriers included interruption of teaching time and busy school schedules. The intervention group (n = 42) showed favourable shifts in belief patterns, stages of change, and lifestyle behaviours, with a trend towards weight loss. Control group (n = 43) changes were limited to dietary intake. The triangulation of results supported the intervention’s feasibility in terms of primary and secondary outcomes. Recommendations for enhancement include adding in-person follow-up sessions and an app-based element to potentially increase impact on lifestyle indicators and weight loss.
APA, Harvard, Vancouver, ISO, and other styles
38

Rodrigues, Miguel Pinheiro, Naércio Magaia, and Paulo Rogério Pereira. "Drop Policies for DTN Routing Protocols with Delivery Probability Estimation." Journal on Advances in Theoretical and Applied Informatics 3, no. 1 (2017): 16. http://dx.doi.org/10.26729/jadi.v3i1.2432.

Full text
Abstract:
Delay Tolerant Networks (DTN) are characterized by a lack of end-to-end connectivity. As such, messages (called bundles) can be stored in buffers for a long time. Network congestion can result in poor delivery rates, as bundles are dropped before having a chance of reaching their destination. Some routing protocols, such as MaxProp and Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET), maintain estimations of delivery probabilities for each destination. In this paper, a new drop policy called Largest Bundle’s Hosts Deliverability (LBHD) is proposed that considers all the hosts that received a replica of the same bundle, and their respective delivery probability as estimated by a routing protocol. LBHD uses this additional information to better manage congestion. Simulation results show that LBHD consistently achieves the best delivery probability when paired with PRoPHET and compared with other drop policies proposed in the literature. Also, when paired with MaxProp, LBHD shows the most efficient performance among all the other state of the art policies considering performance metrics such as average delay, overhead ratio and bundle delivery rate. In addition, another drop policy called One Hop Delivery Estimation Drop (OHDED) is proposed. OHDED takes advantage of the encounter predictions of every node in the network stored in every node when using MaxProp. By accurately predicting the bundles that have the highest probability of being delivered directly or in two hops, the results show the best performance in delivery rate and overhead ratio in high congestion scenarios.
APA, Harvard, Vancouver, ISO, and other styles
39

Riki Astafi, Wira Sugiarto, and Wan Muhammad Fariq. "Upaya Peningkatan Pemahaman Moderasi Beragama Masyarakat Kecamatan Bengkalis." PaKMas: Jurnal Pengabdian Kepada Masyarakat 4, no. 2 (2024): 396–406. https://doi.org/10.54259/pakmas.v4i2.3101.

Full text
Abstract:
The efforts to enhance the understanding of religious moderation in the Bengkalis District aim to strengthen tolerance and social harmony in a diverse society. This community service program is designed to provide education and outreach on the values of religious moderation, such as tolerance, respect, and rejection of extremism. The approach used in this program includes seminars, workshops, and interactive discussions involving various elements of the community, including religious leaders, youth, and local communities. Active participation from different parties is expected to increase the effectiveness of conveying the messages of moderation. The evaluation shows a significant improvement in the community's understanding and attitudes regarding religious moderation. Not only has awareness increased, but the program has also successfully fostered mutual respect among different religious groups. This improvement is reflected in the following indicators: Inclusive and Tolerant Attitudes increased from 40% to 75%, Neutral Attitudes decreased from 35% to 20%, and Exclusive and Intolerant Attitudes dropped from 25% to 5%. Thus, this initiative not only provides short-term positive impacts but also has the potential to become a model for implementing similar programs in other areas. These efforts are expected to contribute to the creation of a more harmonious, tolerant society that can coexist in diversity. The program emphasizes the importance of interfaith dialogue as a foundation for inclusive and peaceful social development, which in turn supports sustainable national development. This program reflects a structured and holistic strategy in promoting religious moderation and building a cohesive society.
APA, Harvard, Vancouver, ISO, and other styles
40

RAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.

Full text
Abstract:
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
41

S.Abujassar, Radwan. "Enhancing Traffic Routing Inside a Network through IoT Technology & Network Clustering by Selecting Smart Leader Nodes." International journal of Computer Networks & Communications 16, no. 2 (2024): 01–24. http://dx.doi.org/10.5121/ijcnc.2024.16201.

Full text
Abstract:
. IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
APA, Harvard, Vancouver, ISO, and other styles
42

Siddiqui, M. Ruby, Andrew Willis, Karla Bil, Jatinder Singh, Eric Mukomena Sompwe, and Cono Ariti. "Adherence to Artemisinin Combination Therapy for the treatment of uncomplicated malaria in the Democratic Republic of the Congo." F1000Research 4 (February 24, 2015): 51. http://dx.doi.org/10.12688/f1000research.6122.1.

Full text
Abstract:
Between 2011 and 2013 the number of recorded malaria cases had more than doubled, and between 2009 and 2013 had increased almost 4-fold in MSF-OCA (Médecins sans Frontières – Operational Centre Amsterdam) programmes in the Democratic Republic of the Congo (DRC). The reasons for this rise are unclear. Incorrect intake of Artemisinin Combination Therapy (ACT) could result in failure to treat the infection and potential recurrence. An adherence study was carried out to assess whether patients were completing the full course of ACT.One hundred and eight malaria patients in Shamwana, Katanga province, DRC were visited in their households the day after ACT was supposed to be completed. They were asked a series of questions about ACT administration and the blister pack was observed (if available).Sixty seven (62.0%) patients were considered probably adherent. This did not take into account the patients that vomited or spat their pills or took them at the incorrect time of day, in which case adherence dropped to 46 (42.6%). The most common reason that patients gave for incomplete/incorrect intake was that they were vomiting or felt unwell (10 patients (24.4%), although the reasons were not recorded for 22 (53.7%) patients). This indicates that there may be poor understanding of the importance of completing the treatment or that the side effects of ACT were significant enough to over-ride the pharmacy instructions.Adherence to ACT was poor in this setting. Health education messages emphasising the need to complete ACT even if patients vomit doses, feel unwell or their health conditions improve should be promoted.
APA, Harvard, Vancouver, ISO, and other styles
43

Siddiqui, M. Ruby, Andrew Willis, Karla Bil, Jatinder Singh, Eric Mukomena Sompwe, and Cono Ariti. "Adherence to Artemisinin Combination Therapy for the treatment of uncomplicated malaria in the Democratic Republic of the Congo." F1000Research 4 (April 8, 2015): 51. http://dx.doi.org/10.12688/f1000research.6122.2.

Full text
Abstract:
Between 2011 and 2013 the number of recorded malaria cases had more than doubled, and between 2009 and 2013 had increased almost 4-fold in MSF-OCA (Médecins sans Frontières – Operational Centre Amsterdam) programmes in the Democratic Republic of the Congo (DRC). The reasons for this rise are unclear. Incorrect intake of Artemisinin Combination Therapy (ACT) could result in failure to treat the infection and potential recurrence. An adherence study was carried out to assess whether patients were completing the full course of ACT.One hundred and eight malaria patients in Shamwana, Katanga province, DRC were visited in their households the day after ACT was supposed to be completed. They were asked a series of questions about ACT administration and the blister pack was observed (if available).Sixty seven (62.0%) patients were considered probably adherent. This did not take into account the patients that vomited or spat their pills or took them at the incorrect time of day, in which case adherence dropped to 46 (42.6%). The most common reason that patients gave for incomplete/incorrect intake was that they were vomiting or felt unwell (10 patients (24.4%), although the reasons were not recorded for 22 (53.7%) patients). This indicates that there may be poor understanding of the importance of completing the treatment or that the side effects of ACT were significant enough to over-ride the pharmacy instructions.Adherence to ACT was poor in this setting. Health education messages emphasising the need to complete ACT even if patients vomit doses, feel unwell or their health conditions improve should be promoted.
APA, Harvard, Vancouver, ISO, and other styles
44

Paludneviciene, Raylene, Tracy Knight, Gideon Firl, Kaela Luttrell, Kota Takayama, and Poorna Kushalnagar. "Perception of COVID-19 Physical Distancing Effectiveness and Contagiousness of Asymptomatic Individuals: Cross-sectional Survey of Deaf and Hard of Hearing Adults in the United States." Journal of Medical Internet Research 23, no. 2 (2021): e21103. http://dx.doi.org/10.2196/21103.

Full text
Abstract:
Background During the COVID-19 pandemic, there has been a rapid increase in the amount of information about the disease and SARS-CoV-2 on the internet. If the language used in video messages is not clear or understandable to deaf and hard of hearing (DHH) people with a high school degree or less, this can cause confusion and result in information gaps among DHH people during a health emergency. Objective The aim of this study is to investigate the relationship between DHH people's perception of the effectiveness of physical distancing and contagiousness of an asymptomatic person. Methods This is a cross-sectional survey study on DHH people's perceptions about COVID-19 (N=475). Items pertaining to COVID-19 knowledge were administered to US deaf adults from April 17, 2020, to May 1, 2020, via a bilingual American Sign Language/English online survey platform. Results The sample consisted of 475 DHH adults aged 18-88 years old, with 74% (n=352) identifying as White and 54% (n=256) as female. About 88% (n=418) of the sample felt they knew most things or a lot about physical distancing. This figure dropped to 72% (n=342) for the question about the effectiveness of physical distancing in reducing the spread of COVID-19 and 70% (n=333) for the question about the contagiousness of an infected person without symptoms. Education and a knowledge of the effectiveness of physical distancing significantly predicted knowledge about the contagiousness of an asymptomatic individual. Race, gender, and age did not emerge as significant predictors. Conclusions This results of this study point to the strong connection between education and coronavirus-related knowledge. Education-related disparities can be remedied by making information fully accessible and easily understood during emergencies and pandemics.
APA, Harvard, Vancouver, ISO, and other styles
45

Nhangave, Amancio Vicente, Isabelle Munyangaju, Dulce Osório, et al. "Factors associated with the use of long-lasting insecticidal nets in pregnant women and mothers with children under five years of age in Gaza province, Mozambique." PLOS Global Public Health 4, no. 1 (2024): e0002811. http://dx.doi.org/10.1371/journal.pgph.0002811.

Full text
Abstract:
Malaria remains a major public health concern worldwide. Malaria is endemic in Mozambique, with seasonal fluctuations throughout the country. Although the number of malaria cases in Mozambique have dropped by 11% from 2020 to 2021, there are still hotspots in the country with persistent high incidence and low insecticide-treated bed net usage. The aim of this study is to evaluate the factors associated with the use of long-lasting insecticidal nets by pregnant women and women with children under 5 years old in two hotspot districts in the Gaza province, Mozambique. A descriptive, qualitative cross-sectional study was conducted between June 15th and 21st 2022. An in-depth interview process was conducted with pregnant women and mothers with children under five years old, exploring their beliefs, experiences, and perception of messages conveyed by health professionals when long-lasting insecticidal nets were being supplied. A total of 48 women participated (24 pregnant women and 24 women with children under 5 years). Most participants recognized the protective effects of long-lasting insecticidal nets in preventing malaria, and understood that women and children were high risk groups. The nets were reported to cause side effects and difficulty breathing by 100% of pregnant women, while 54.2% of mothers with children under 5 reported no side effects. The majority of women in both groups reported that their health professionals did not educate them about how to use or handle the nets properly. Only 16.7% of mothers with children under 5 received correct handling instructions. Providing clear, culturally sensitive, and practical information on the correct use of LLINs, as well as regular monitoring of their proper use, would be a great step forward for Mozambique’s national malaria program.
APA, Harvard, Vancouver, ISO, and other styles
46

Pascual-Caro, Carlos, Maria Berrocal, Aida M. Lopez-Guerrero, et al. "STIM1 deficiency is linked to Alzheimer’s disease and triggers cell death in SH-SY5Y cells by upregulation of L-type voltage-operated Ca2+ entry." Journal of Molecular Medicine 96, no. 10 (2018): 1061–79. http://dx.doi.org/10.1007/s00109-018-1677-y.

Full text
Abstract:
Abstract STIM1 is an endoplasmic reticulum protein with a role in Ca2+ mobilization and signaling. As a sensor of intraluminal Ca2+ levels, STIM1 modulates plasma membrane Ca2+ channels to regulate Ca2+ entry. In neuroblastoma SH-SY5Y cells and in familial Alzheimer’s disease patient skin fibroblasts, STIM1 is cleaved at the transmembrane domain by the presenilin-1-associated γ-secretase, leading to dysregulation of Ca2+ homeostasis. In this report, we investigated expression levels of STIM1 in brain tissues (medium frontal gyrus) of pathologically confirmed Alzheimer’s disease patients, and observed that STIM1 protein expression level decreased with the progression of neurodegeneration. To study the role of STIM1 in neurodegeneration, a strategy was designed to knock-out the expression of STIM1 gene in the SH-SY5Y neuroblastoma cell line by CRISPR/Cas9-mediated genome editing, as an in vitro model to examine the phenotype of STIM1-deficient neuronal cells. It was proved that, while STIM1 is not required for the differentiation of SH-SY5Y cells, it is absolutely essential for cell survival in differentiating cells. Differentiated STIM1-KO cells showed a significant decrease of mitochondrial respiratory chain complex I activity, mitochondrial inner membrane depolarization, reduced mitochondrial free Ca2+ concentration, and higher levels of senescence as compared with wild-type cells. In parallel, STIM1-KO cells showed a potentiated Ca2+ entry in response to depolarization, which was sensitive to nifedipine, pointing to L-type voltage-operated Ca2+ channels as mediators of the upregulated Ca2+ entry. The stable knocking-down of CACNA1C transcripts restored mitochondrial function, increased mitochondrial Ca2+ levels, and dropped senescence to basal levels, demonstrating the essential role of the upregulation of voltage-operated Ca2+ entry through Cav1.2 channels in STIM1-deficient SH-SY5Y cell death. Key messages STIM1 protein expression decreases with the progression of neurodegeneration in Alzheimer’s disease. STIM1 is essential for cell viability in differentiated SH-SY5Y cells. STIM1 deficiency triggers voltage-regulated Ca2+ entry-dependent cell death. Mitochondrial dysfunction and senescence are features of STIM1-deficient differentiated cells.
APA, Harvard, Vancouver, ISO, and other styles
47

Kumwenda, A., and B. Vwalika. "Outcomes and factors associated with adolescent pregnancies at the University Teaching Hospital, Lusaka, Zambia." Medical Journal of Zambia 44, no. 4 (2017): 244–49. http://dx.doi.org/10.55320/mjz.44.4.289.

Full text
Abstract:

 
 
 
 
 
 
 
 Objectives: These were to determine obstetric outcomes associated with adolescent pregnancies and those of older women at the UTH, identify factors associated with and compare the obstetric outcomes between the two age groups with determining the scale of adolescent pregnancy.
 Materials and methods: This was a comparative prospective cross sectional study with a purposeful sample of 200 pregnant adolescents and women aged between 20 and 30 years in a ratio of 1:1.
 Results: 3,456 women delivered between September and October, 2015 out of which 480 (13.9%) were adolescents. Of the 100 adolescents studied, 62(62%) had dropped out of school due to pregnancy and 81(81%) of the pregnancies were unplanned. Factors associated with adolescent pregnancies noted included mean age at coitarche (p<0.001), early marriages (p<0.001; AOR 14.6, 95% CI: 4.642 - 45.99), primary education (p 0.002; AOR 4.522, 95% CI: 1.758 – 11.634), having a boyfriend (p<0.001; AOR 12.70, 95% CI: 4.04 – 39.91) and contraceptive use. There were 95(95%) adolescents who had never used a contraceptive before compared to 40(40%) older women (p<0.001). Adolescents were also significantly associated with first degree perineal tears (p<0.001; AOR 3.46, 95% CI: 1.83 - 6.56) and preterm deliveries (p 0.026, AOR 2.60, 95% CI: 1.16 - 5.78). Furthermore, although not statistically significant, more adolescents 22(22%) had low birth weight babies compared to 14(14% older women and 11(11%) had pregnancy induced hypertension versus 7(7%) older mothers. In addition, out of the 10 documented caesarean sections among the study participants, 8(80%) were done among adolescents (p 0.052).
 Conclusion: Several factors and adverse obstetric outcomes are associated with adolescent pregnancies seen at the UTH. Although adolescent pregnancy is reducing, it remains high and contributing significantly to discontinuation of school. Key stakeholders need to continue targeting adolescents with appropriate health messages including an emphasis on increased access to and utilization of effective contraceptives.
 
 
 
 
 
 
 
 
APA, Harvard, Vancouver, ISO, and other styles
48

Kumwenda, Andrew, and B. Vwalika. "Outcomes and Factors Associated with Adolescent Pregnancies at the University Teaching Hospital, Lusaka, Zambia." Medical Journal of Zambia 44, no. 4 (2017): 244–49. http://dx.doi.org/10.55320/mjz.44.4.91.

Full text
Abstract:
Objectives: These were to determine obstetric outcomes associated with adolescent pregnancies and those of older women at the UTH, identify factors associated with and compare the obstetric outcomes between the two age groups with determining the scale of adolescent pregnancy.
 Materials and methods: This was a comparative prospective cross sectional study with a purposeful sample of 200 pregnant adolescents and women aged between 20 and 30 years in a ratio of 1:1.
 Results: 3,456 women delivered between September and October, 2015 out of which 480 (13.9%) were adolescents. Of the 100 adolescents studied, 62(62%) had dropped out of school due to pregnancy and 81(81%) of the pregnancies were unplanned.
 Factors associated with adolescent pregnancies noted included mean age at coitarche (p <0.001), early marriages (p <0.001; AOR 14.6, 95% CI: 4.642 - 45.99), primary education (p 0.002; AOR 4.522, 95% CI: 1.758 – 11.634), having a boyfriend (p<0.001; AOR 12.70, 95% CI: 4.04 – 39.91) and contraceptive use. There were 95(95%) adolescents who had never used a contraceptive before compared to 40(40%) older women (p <0.001). 
 Adolescents were also significantly associated with first degree perineal tears (p<0.001; AOR 3.46, 95% CI: 1.83 - 6.56) and preterm deliveries (p 0.026, AOR 2.60, 95% CI: 1.16 - 5.78). Furthermore, although not statistically significant, more adolescents 22(22%) had low birth weight babies compared to 14(14% older women and 11(11%) had pregnancy induced hypertension versus 7(7%) older mothers. In addition, out of the 10 documented caesarean sections among the study participants, 8(80%) were done among adolescents (p 0.052).
 Conclusion: Several factors and adverse obstetric outcomes are associated with adolescent pregnancies seen at the UTH. Although adolescent pregnancy is reducing, it remains high and contributing significantly to discontinuation of school. Key stakeholders need to continue targeting adolescents with appropriate health messages including an emphasis on increased access to and utilization of effective contraceptives.
APA, Harvard, Vancouver, ISO, and other styles
49

Banerjee, Rahul, Chiung-Yu Huang, Lisa Dunn, et al. "Feasibility of digital life coaching during stem cell transplantation for multiple myeloma." Journal of Clinical Oncology 39, no. 15_suppl (2021): e24103-e24103. http://dx.doi.org/10.1200/jco.2021.39.15_suppl.e24103.

Full text
Abstract:
e24103 Background: Patients with multiple myeloma (MM) experience acute quality of life (QOL) exacerbations following autologous stem cell transplantation (ASCT) that can lead to long-term complications. Life coaching can improve QOL in a structured & personalized manner. We investigated the feasibility of a digital life coaching (DLC) platform, where coaching is accomplished through phone calls and text messages, for patients with MM during ASCT. Methods: Our pilot study (clinicaltrials.gov ID: NCT04432818) enrolled adult patients with MM, English proficiency, and cellphone ownership (smartphone not required). The 16-week DLC program, beginning at Day -5 before ASCT, included unlimited digital access to a certified life coach to help with identifying and accomplishing wellness-related goals. Our primary outcome was ongoing DLC engagement (≥ 1 bidirectional conversation every 4 weeks). Secondary outcomes were ePRO assessments of QOL (PROMIS Global Health), insomnia (PROMIS Sleep Disturbances), and distress (NCCN DT). Electronic patient-reported outcome (ePRO) assessments were delivered via automated REDCap emails every 1-2 weeks. Results: Of 18 screened patients, 15 (83%) enrolled in our study; 2 patients dropped out before initiating DLC (including 1 who was unable to connect with her coach between Day -5 and 0). Of 13 remaining patients, median age was 65 (range 50-81) and 23% had an ECOG performance status of 1 (remainder 0). DLC conversations occurred a mean of every 7.6 days (range 3-28) overall and every 6.5 days (range 2.8-14) during the initial 28-day period including high-dose melphalan and hospitalization. 80% of patients maintained ≥ 1 conversation every 4 weeks. Selected ePRO results (mean ± standard error) are shown in the table. Conclusions: Certain MM patients are able to engage digitally with a life coach and complete email-based ePRO assessments during and after ASCT. Limitations of our study include selection bias and the Day -5 start date, which may be too late logistically and symptom-wise (given our ePRO findings suggestive of peak distress pre-ASCT). DLC may play an innovative and scalable role given the emphasis on remotely delivered care during the COVID-19 pandemic. A Phase II randomized study of DLC versus usual care is under way (clinicaltrials.gov ID: NCT04589286). Clinical trial information: NCT04432818. [Table: see text]
APA, Harvard, Vancouver, ISO, and other styles
50

"Performance Improvement of DTN Routing Protocols with Enhanced Buffer Management Policy." International Journal of Recent Technology and Engineering 8, no. 4 (2019): 9852–57. http://dx.doi.org/10.35940/ijrte.d9145.118419.

Full text
Abstract:
Delay tolerant network (DTN) is one of the emerging technologies which is applied generally when there is no end-to-end path exists from source to destination all the time. The two major issues in DTN are routing and buffer management. Existing buffer management policies are based on one or more parameters such as message Time-to-Live, message age, message replication count, message size etc.,. There is no efficient approach is available for estimation of message replication count. In this work an efficient approach is proposed to estimate total number of copies of the message. The proposed buffer management approach prioritizes the messages and based on which the messages are forwarded/dropped from the buffer when there is a contact opportunity occurs/when the buffer is full. These priorities are based on message Time-to-Live, message age, message replication count and message size. This proposed buffer management policy is evaluated with two popular DTN routing protocols Spray-and-Wait and Prophet. The simulation results show that delivery probability of messages has increased with reduced buffer time average and minimized latency.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography