To see the other types of publications on this topic, follow the link: QUIC Protocol.

Journal articles on the topic 'QUIC Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'QUIC Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Jianyi. "The Performance and Future of QUIC Protocol in the Modern Internet." Network and Communication Technologies 6, no. 1 (July 7, 2021): 28. http://dx.doi.org/10.5539/nct.v6n1p28.

Full text
Abstract:
Quick UDP Internet Connections (QUIC) protocol is a potential replacement for the TCP protocol to transport HTTP encrypted traffic. It is based on UDP and offers flexibility, speed, and low latency. The performance of QUIC is related to the everyday web browsing experience. QUIC is famous for its Forward Error Correction (Luyi, Jinyi, & Xiaohua, 2012) and congestion control (Hari, Hariharan, & Srinivasan, 1999) algorithm that improves user browsing delay by reducing the time spent on loss recovery (Jörg, Ernst, & Don, 1998). This paper will compare QUIC with other protocols such as HTTP/2 over TCP, WebSocket, and TCP fast open in terms of latency reduction and loss recovery to determine the role of each protocol in the modern internet. Furthermore, this paper will propose potential further improvements to the QUIC protocol by studying other protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Jean-Pierre, Prateek Mittal, and Adrian Perrig. "Website Fingerprinting in the Age of QUIC." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 48–69. http://dx.doi.org/10.2478/popets-2021-0017.

Full text
Abstract:
Abstract With the meteoric rise of the QUIC protocol, the supremacy of TCP as the de facto transport protocol underlying web traffic will soon cease. HTTP/3, the next version of the HTTP protocol, will not support TCP. Current website-fingerprinting literature has ignored the introduction of this new protocol to all modern browsers. In this work, we investigate whether classifiers trained in the TCP setting generalise to QUIC traces, whether QUIC is inherently more difficult to fingerprint than TCP, how feature importance changes between these protocols, and how to jointly classify QUIC and TCP traces. Experiments using four state-of-theart website-fingerprinting classifiers and our combined QUIC-TCP dataset of ~117,000 traces show that while QUIC is not inherently more difficult to fingerprint than TCP, TCP-trained classifiers may fail to detect up to 96% of QUIC visits to monitored URLs. Furthermore, classifiers that take advantage of the common information between QUIC and TCP traces for the same URL may outperform ensembles of protocol-specific classifiers in limited data settings.
APA, Harvard, Vancouver, ISO, and other styles
3

Khalifeh, Ala’, Ma’moun Mansour, and Sahel Alouneh. "QUIC transmission protocol: Test-bed design, implementation and experimental evaluation." Journal of Electrical Engineering 72, no. 1 (February 1, 2021): 20–28. http://dx.doi.org/10.2478/jee-2021-0003.

Full text
Abstract:
Abstract With the ever increasing demand for higher speed internet connectivity that can fulfil the application continuous need for higher bandwidth Google being the pioneer in many web-based services has launched a new UDP-based protocol named quick UDP internet connections (QUIC), which aims at providing faster data delivery without requiring upgrades or modifications to the network infrastructure. The goal of this paper is to provide an overview about QUIC protocol, propose the design and implementation of a test-bed, that is used experimentally to evaluate QUIC protocol under different network conditions and scenarios. In particular, the performance advantage of QUIC in terms of delay and throughput are examined taking into account different network conditions that resemble the real internet environment. Two scenarios are proposed, the first one investigates the protocol performance under a controlled network environment, while the second one tests the protocol in a real uncontrolled network. To achieve that, a test-bed is proposed and implemented that emulates the network impairments encountered in real-network such as packet loss, bit errors, and bandwidth limitation in a controlled manner. After that, QUIC is tested in real operational wired and wireless networks. In both scenarios, QUIC outperforms TCP in terms of delay, which strengthens QUIC position for being a potential alternative to TCP.
APA, Harvard, Vancouver, ISO, and other styles
4

Roy, Minakshi, Shamsh Ahsan, Gaurav Kumar, and Ajay Vimal. "Implementation of Quick UDP Internet Connections." International Journal of Engineering and Computer Science 9, no. 01 (January 22, 2020): 24921–24. http://dx.doi.org/10.18535/ijecs/v9i01.4425.

Full text
Abstract:
With the advent of the Internet growth worldwide, we need to have a protocol which is faster and provides a better support for the following problems: Faster Connection Establishment Time Good Congestion Control Connection Migration Good Error Correction One of the key aspects taken under consideration was current scenario of connection establishment time whenever a website is requested and poor video buffering over existing Internet Connections. The prime objective is to create a proxy server which routes the incoming connection requests to QUIC supported libraries if the client supports QUIC. If the client does not support QUIC then it routes the incoming request to existing web server which can then handle the request using TCP. After creation of the proxy server a website has to be created using which we can test various aspects of the QUIC protocol. Keyword: Quick, Protocol, UDP, Network
APA, Harvard, Vancouver, ISO, and other styles
5

De Coninck, Quentin, and Olivier Bonaventure. "Multiflow QUIC: A Generic Multipath Transport Protocol." IEEE Communications Magazine 59, no. 5 (May 2021): 108–13. http://dx.doi.org/10.1109/mcom.001.2000892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kharat, Prashant, and Muralidhar Kulkarni. "Modified QUIC protocol for improved network performance and comparison with QUIC and TCP." International Journal of Internet Protocol Technology 12, no. 1 (2019): 35. http://dx.doi.org/10.1504/ijipt.2019.098489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kulkarni, Muralidhar, and Prashant Kharat. "Modified QUIC protocol for improved network performance and comparison with QUIC and TCP." International Journal of Internet Protocol Technology 12, no. 1 (2019): 35. http://dx.doi.org/10.1504/ijipt.2019.10019902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Jingjing, Xianming Gao, Lin Yang, Tao Feng, Dongyang Li, and Qiang Wang. "A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking." Security and Communication Networks 2021 (August 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/1630223.

Full text
Abstract:
As a newly proposed secure transport protocol, QUIC aims to improve the transport performance of HTTPS traffic and enable rapid deployment and evolution of transport mechanisms. QUIC is currently in the IETF standardization process and will potentially carry a significant portion of Internet traffic in the emerging future. An important safety goal of QUIC protocol is to provide effective data service for users. To aim this safety requirement, we propose a formal analysis method to analyze the safety of QUIC handshake protocol by using model checker SPIN and cryptographic protocol verifier ProVerif. Our analysis shows the counterexamples to safety properties, which reveal a design flaw in the current protocol specification. To this end, we also propose and verify a possible fix that is able to mitigate these flaws.
APA, Harvard, Vancouver, ISO, and other styles
9

Lopes, Raul H. C., Virginia N. L. Franqueira, and Duncan Rand. "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers." EPJ Web of Conferences 214 (2019): 08026. http://dx.doi.org/10.1051/epjconf/201921408026.

Full text
Abstract:
Two recent and promising additions to the internet protocols are TCP-BBR and QUIC. BBR defines a congestion policy that promises a better control in TCP bottlenecks on long haul transfers and can also be used in the QUIC protocol. TCP-BBR is implemented in the Linux kernels above 4.9. It has been shown, however, to demand careful fine tuning in the interaction, for example, with the Linux Fair Queue. QUIC, on the other hand, replaces HTTP and TLS with a protocol on the top of UDP and thin layer to serve HTTP. It has been reported to account today for 7% of Google’s traffic. It has not been used in server-to-server transfers even if its creators see that as a real possibility. Our work evaluates the applicability and tuning of TCP-BBR and QUIC for data science transfers. We describe the deployment and performance evaluation of TCP-BBR and comparison with CUBIC and H-TCP in transfers through the TEIN link to Singaren (Singapore). Also described is the deployment and initial evaluation of a QUIC server. We argue that QUIC might be a perfect match in security and connectivity to base services that are today performed by the Xroot redirectors.
APA, Harvard, Vancouver, ISO, and other styles
10

Fernández, Fátima, Mihail Zverev, Pablo Garrido, José R. Juárez, Josu Bilbao, and Ramón Agüero. "Even Lower Latency in IIoT: Evaluation of QUIC in Industrial IoT Scenarios." Sensors 21, no. 17 (August 26, 2021): 5737. http://dx.doi.org/10.3390/s21175737.

Full text
Abstract:
In this paper we analyze the performance of QUIC as a transport alternative for Internet of Things (IoT) services based on the Message Queuing Telemetry Protocol (MQTT). QUIC is a novel protocol promoted by Google, and was originally conceived to tackle the limitations of the traditional Transmission Control Protocol (TCP), specifically aiming at the reduction of the latency caused by connection establishment. QUIC use in IoT environments is not widespread, and it is therefore interesting to characterize its performance when in over such scenarios. We used an emulation-based platform, where we integrated QUIC and MQTT (using GO-based implementations) and compared their combined performance with the that exhibited by the traditional TCP/TLS approach. We used Linux containers as end devices, and the ns-3 simulator to emulate different network technologies, such as WiFi, cellular, and satellite, and varying conditions. The results evince that QUIC is indeed an appropriate protocol to guarantee robust, secure, and low latency communications over IoT scenarios.
APA, Harvard, Vancouver, ISO, and other styles
11

Sy, Erik, Christian Burkert, Hannes Federrath, and Mathias Fischer. "A QUIC Look at Web Tracking." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.

Full text
Abstract:
Abstract QUIC has been developed by Google to improve the transport performance of HTTPS traffic. It currently accounts for approx. 7% of the global Internet traffic. In this work, we investigate the feasibility of user tracking via QUIC from the perspective of an online service. Our analysis reveals that the protocol design contains violations of privacy best practices through which a tracker can passively and uniquely identify clients across several connections. This tracking mechanisms can achieve reduced delays and bandwidth requirements compared to conventional browser fingerprinting or HTTP cookies. This allows them to be applied in resource- or time-constrained scenarios such as real-time biddings in online advertising. To validate this finding, we investigated browsers which enable QUIC by default, e.g., Google Chrome. Our results suggest that the analyzed browsers do not provide protective measures against tracking via QUIC. However, the introduced mechanisms reset during a browser restart, which clears the cached connection data and thus limits achievable tracking periods. To mitigate the identified privacy issues, we propose changes to QUIC’s protocol design, the operation of QUIC-enabled web servers, and browser implementations.
APA, Harvard, Vancouver, ISO, and other styles
12

Hermann, Peter, Mareike Laux, Markus Glatzel, Jakob Matschke, Tobias Knipper, Stefan Goebel, Johannes Treig, et al. "Validation and utilization of amended diagnostic criteria in Creutzfeldt-Jakob disease surveillance." Neurology 91, no. 4 (June 22, 2018): e331-e338. http://dx.doi.org/10.1212/wnl.0000000000005860.

Full text
Abstract:
ObjectiveTo validate an amended protocol for clinical diagnosis of sporadic Creutzfeldt-Jakob disease (sCJD) including real-time quaking-induced conversion (RT-QuIC) and to observe its use in CJD surveillance.MethodsIn the framework of a prospective epidemiologic study, all neuropathologically confirmed cases with sCJD who received CSF RT-QuIC analysis during diagnostic workup (n = 65) and a control group of individuals without CJD (n = 118) were selected to investigate the accuracy of an amended diagnostic protocol. The patients had been referred to the German National Reference Center for Transmissible Spongiform Encephalopathies. The influence of the amended protocol on incidence figures was evaluated in the context of 3 years of surveillance activity (screened cases using 14-3-3 test n = 18,789, highly suspicious cases of CJD n = 704). Annual incidences were calculated with current criteria and the amended protocol.ResultsThe amended protocol showed a sensitivity of 97% and a specificity of 99%. When it was applied to all suspected cases who were referred to the reference center, the assessed incidence of CJD increased from 1.7 to 2.2 per million in 2016.ConclusionCJD surveillance remains challenging because information from external health care institutions can be limited. RT-QuIC shows excellent diagnostic accuracy when applied in the clinical setting to symptomatic patients. Data for RT-QuIC alone when applied as a general screening test are not available yet. We propose an amended research protocol that improves early and accurate clinical diagnosis of sCJD during surveillance activities. The use of this protocol will probably lead to a significant increase of the incidence rate.Classification of evidenceThis study provides Class III evidence that for patients with suspected sCJD, criteria for clinical diagnosis plus the CSF RT-QuIC accurately identifies patients with sCJD (sensitivity 97%, specificity 99%).
APA, Harvard, Vancouver, ISO, and other styles
13

Welzl, Michael, Stephan Oepen, Cezary Jaskula, Carsten Griwodz, and Safiqul Islam. "Collaboration in the IETF." ACM SIGCOMM Computer Communication Review 51, no. 3 (July 11, 2021): 29–32. http://dx.doi.org/10.1145/3477482.3477488.

Full text
Abstract:
RFC 9000, published in May 2021, marks an important milestone for the Internet's standardization body, the Internet Engineering Task Force (IETF): finally, the specification of the QUIC protocol is available. QUIC is the result of a five-year effort - and it is also the second of two major protocols (the first being SPDY, which later became HTTP/2) that Google LLC first deployed, and then brought to the IETF for standardization. This begs the question: when big players follow such a "shoot first, discuss later" approach, is IETF collaboration still "real", or is the IETF now being (mis-)used to approve protocols for standardization when they are already practically established, without really actively involving anyone but the main proponents?
APA, Harvard, Vancouver, ISO, and other styles
14

Günther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.

Full text
Abstract:
AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.
APA, Harvard, Vancouver, ISO, and other styles
15

Budhram, Adrian, Ryan G. Taylor, Jeff Fuller, Jorge G. Burneo, J. David Knox, and Stephen H. Pasternak. "The Predictive Value of Endpoint Quaking-Induced Conversion in Creutzfeldt-Jakob Disease." Canadian Journal of Neurological Sciences / Journal Canadien des Sciences Neurologiques 46, no. 5 (July 3, 2019): 595–98. http://dx.doi.org/10.1017/cjn.2019.72.

Full text
Abstract:
ABSTRACT:Creutzfeldt-Jakob disease (CJD) is a fatal neurological illness for which accurate diagnosis is paramount. Real-time quaking-induced conversion (RT-QuIC) is a prion-specific assay with high sensitivity and specificity for CJD. The Canadian endpoint quaking-induced conversion (EP-QuIC) test is similar, but unlike RT-QuIC there is little data regarding its diagnostic utility in clinical practice. In this exploratory predictive value analysis of EP-QuIC in CJD, the negative predictive value (NPV) and positive predictive value (PPV) was 100% and 83%, respectively, with one false-positive result identified. Re-testing this sample with an optimized EP-QuIC protocol eliminated this false-positive result, leading to a PPV of 100%.
APA, Harvard, Vancouver, ISO, and other styles
16

Kanagarathinam, Madhan Raj, Sukhdeep Singh, Sujith Rengan Jayaseelan, Mukesh Kumar Maheshwari, Gunjan Kumar Choudhary, and Gaurav Sinha. "QSOCKS: 0-RTT Proxification Design of SOCKS Protocol for QUIC." IEEE Access 8 (2020): 145862–70. http://dx.doi.org/10.1109/access.2020.3013524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Jingjing, Lin Yang, Xianming Gao, Gaigai Tang, Jiyong Zhang, and Qiang Wang. "Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking." IEEE Access 9 (2021): 14836–48. http://dx.doi.org/10.1109/access.2021.3052578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kharat, Prashant, and Muralidhar Kulkarni. "Modified QUIC protocol with congestion control for improved network performance." IET Communications 15, no. 9 (March 11, 2021): 1210–22. http://dx.doi.org/10.1049/cmu2.12154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jung, Jinhwa, and Donghyeok An. "Access Latency Reduction in the QUIC Protocol Based on Communication History." Electronics 8, no. 10 (October 22, 2019): 1204. http://dx.doi.org/10.3390/electronics8101204.

Full text
Abstract:
Internet traffic is experiencing rapid growth, with the majority of traffic generated from video steaming, web data services and Internet of Things. As these services include the transmission of small data, such as web pages, video chunks and sensing data, data latency affects the quality of experience rather than the throughput. Therefore, this study aims to decrease latency to improve the quality of the user experience. To this end, we measure the web service delay and throughput in mobile networks. The results indicate a low quality experience for mobile users, even though mobile networks support a large throughput. We therefore propose a light-weight latency reduction scheme for the Quick UDP Internet Connections (QUIC) protocol. The proposed scheme calculates the average congestion window, which is utilized as the initial congestion window when a new connection is established. The proposed scheme is evaluated through experiments on a testbed. The results show that our scheme reduces latency significantly. The results of this study can help improve user experiences of video streaming and web data services.
APA, Harvard, Vancouver, ISO, and other styles
20

Basyoni, Lamiaa, Aiman Erbad, Mashael Alsabah, Noora Fetais, Amr Mohamed, and Mohsen Guizani. "QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol." IEEE Access 9 (2021): 28769–84. http://dx.doi.org/10.1109/access.2021.3059672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Tran, Chanh Minh, Tho Nguyen Duc, Phan Xuan Tan, and Eiji Kamioka. "Cross-Protocol Unfairness between Adaptive Streaming Clients over HTTP/3 and HTTP/2: A Root-Cause Analysis." Electronics 10, no. 15 (July 21, 2021): 1755. http://dx.doi.org/10.3390/electronics10151755.

Full text
Abstract:
With the introduction of HTTP/3, whose transport is no longer the traditional TCP protocol but the novel QUIC protocol, research for solutions to the unfairness of Adaptive Streaming over HTTP (HAS) has become more challenging. In other words, because of different transport layers, the HTTP/3 may not be available for some networks and the clients have to use HTTP/2 for their HAS applications instead. Therefore, the scenario in which HAS over HTTP/3 (HAS/3) competes against HTTP/2 (HAS/2) must be considered seriously. However, there has been a shortage of investigations on the performance and the origin of the unfairness in such a cross-protocol scenario in order to produce proper solutions. Therefore, this paper provides a performance evaluation and root-cause analysis of the cross-protocol unfairness between HAS/3 and HAS/2. It is concluded that, due to differences in the congestion control mechanisms of QUIC and TCP, HAS/3 clients obtain larger congestion windows, thus requesting higher video bitrates than HAS/2. As the problem lies in the transport layer, existing client-side ABR-based solutions for the unfairness from the application layer may perform suboptimally for the cross-protocol case.
APA, Harvard, Vancouver, ISO, and other styles
22

Firmansyah, Muhammad Hafidh, Joong-Hwa Jung, and Seok-Joo Koh. "Proxy-Based Adaptive Transmission of MP-QUIC in Internet-of-Things Environment." Electronics 10, no. 17 (September 6, 2021): 2175. http://dx.doi.org/10.3390/electronics10172175.

Full text
Abstract:
With the growth of Internet of Things (IoT) services and applications, the efficient transmission of IoT data has been crucially required. The IETF has recently developed the QUIC protocol for UDP-based multiplexed and secure transport. The Multipath QUIC (MP-QUIC) is also being discussed as an extension of QUIC in the multipath network environment. In this paper, we propose a proxy-based adaptive MP-QUIC transmission for throughput enhancement in the IoT environment. In the proposed scheme, a proxy device is employed between IoT clients and IoT server to aggregate the traffics of many clients in the access network. The proxy will transport a large among of traffics to the server, adaptively to the network conditions, by using multiple paths in the backbone network. For this purpose, the proxy device employs a path manager to monitor the current network conditions and a connection manager to manage the MP-QUIC connections with the IoT server over the backbone network with multiple paths. For effective MP-QUIC transmission, the proxy will transmit the prioritized packets to the server using the best path with the lowest round-trip time (RTT), whereas the non-prioritized packets are delivered over the other paths for traffic load balancing in the network. From the testbed experimentations with the MP-QUIC implementation and ns-3 simulation modules, we see that the proposed scheme can outperform the normal QUIC (using a single path) and the existing MP-QUIC scheme (using the round-robin policy) in terms of response delay and total transmission delay. Such performance gaps tend to increase as the link delays and packet loss rates get larger in the network.
APA, Harvard, Vancouver, ISO, and other styles
23

Pal, Abhijit, Sarah Stapleton, Christina Yap, Julia Lai-Kwon, Robert Daly, Dimitrios Magkos, Bindumalini Rao Baikady, et al. "Study protocol for a randomised controlled trial of enhanced informed consent compared to standard informed consent to improve patient understanding of early phase oncology clinical trials (CONSENT)." BMJ Open 11, no. 9 (September 2021): e049217. http://dx.doi.org/10.1136/bmjopen-2021-049217.

Full text
Abstract:
IntroductionEarly phase cancer clinical trials have become increasingly complicated in terms of patient selection and trial procedures—this is reflected in the increasing length of participant information sheets (PIS). Informed consent for early phase clinical trials has been contentious due to the potential ethical issues associated with performing experimental research on a terminally ill population which has exhausted standard treatment options. Empirical studies have demonstrated significant gaps in patient understanding regarding the nature and intent of these trials. This study aims to test whether enhanced informed consent for patient education can improve patient scores on a validated questionnaire testing clinical trial comprehension.Methods and analysisThis is a randomised controlled trial that will allocate patients who are eligible to participate in one of four investigator-initiated clinical trials at the Royal Marsden Drug Development Unit to either a standard arm or an experimental arm, stratified by age and educational level. The standard arm will involve the full length trial PIS, followed by electronic or paper administration of the Quality of Informed Consent Questionnaire Parts A and B (QuIC-A and QuIC-B). The experimental arm will involve the full length trial PIS, exposure to a two-page study aid and 10 online educational videos, followed by administration of the QuIC-A and QuIC-B. The primary endpoint will be the difference (using a one-sided two-sample t-test) in the QuIC-A score, which measures objective understanding, between the standard and experimental arm. Accrual target is at least 17 patients per arm to detect an 8 point difference (80% power, alpha 0.05).Ethics and disseminationEthics approval was granted by the National Health Service Health Research Authority on 15 June 2020—IRAS Project ID 277065, Protocol Number CCR5165, REC Reference 20/EE/0155. Results will be disseminated via publication in a relevant journal.Trial registration numberNCT04407676; Pre-results.
APA, Harvard, Vancouver, ISO, and other styles
24

Guillen, Luis, Satoru Izumi, Toru Abe, and Takuo Suganuma. "SAND/3: SDN-Assisted Novel QoE Control Method for Dynamic Adaptive Streaming over HTTP/3." Electronics 8, no. 8 (August 4, 2019): 864. http://dx.doi.org/10.3390/electronics8080864.

Full text
Abstract:
Dynamic Adaptive Streaming over HTTP (DASH) is a widely used standard for video content delivery. Video traffic, most of which is generated from mobile devices, is shortly to become the most significant part of Internet traffic. Current DASH solutions only consider either client- or server-side optimization, leaving other components in DASH (e.g., at the transport layer) to default solutions that cause a performance bottleneck. In that regard, although it is assumed that HTTP must be necessarily transported on top of TCP, with the latest introduction of HTTP/3, it is time to re-evaluate its effects on DASH. The most substantial change in HTTP/3 is having Quick UDP Internet Connections (QUIC) as its primary underlying transport protocol. However, little is still know about the effects on standard DASH client-based adaption algorithms when exposed to the future HTTP/3. In this paper, we present SAND/3, an SDN (Software Defined Networking)-based Quality of Experience (QoE) control method for DASH over HTTP/3. Since the official deployment of HTTP/3 has not been released yet, we used the current implementation of Google QUIC. Preliminary results show that, by applying SAND/3, which combines information from different layers orchestrated by SDN to select the best QoE, we can obtain steadier media throughput, reduce the number of quality shifts in at least 40%, increase the amount downloaded content at least 20%, and minimize video interruptions compared to the current implementations regardless of the client adaption algorithm.
APA, Harvard, Vancouver, ISO, and other styles
25

Kaul, Christina, Aradhana Khameraj, Prashant Malhotra, and Bruce Farber. "Transmissible Spongiform Encephalopathies: An Underrecognized Infection Control Issue." Infection Control & Hospital Epidemiology 41, S1 (October 2020): s82. http://dx.doi.org/10.1017/ice.2020.574.

Full text
Abstract:
Background: Transmissible spongiform encephalopathies comprise a class of rapidly progressive and inevitably fatal degenerative brain disorders. The pathogenesis of these diseases is thought to be due to a change in the structure of the normal prion protein to an abnormal structure, leading to propagation of the abnormal protein. This abnormal protein is highly transmissible; thus, appropriate infection control measures should be put in place if the diagnosis is suspected. However, the diagnosis is often not considered at all, and many hospitals do not have protocols in place. Our hospital missed a case of familial fatal insomnia in a 45-year-old male. He was diagnosed with fatal familial insomnia by autopsy. The autopsy was performed without appropriate infection control measures, leading to costly contamination of medical instruments and exposure of multiple staff. This occurrence led our institution to re-evaluate hospital protocols and guidelines regarding workup and management of transmissible spongiform encephalopathies (TSEs). Methods: We reviewed cases of TSEs or Creutzfeldt-Jakob Disease (CJD)-like illness presenting to our hospital over a 30-month period. Patients were considered for inclusion based on clinical suspicion. CDC diagnostic criteria were used. Infection control measures were employed, including an alert in the EMR. MRI was then performed. If clinical or diagnostic suspicion was high, the patient underwent lumbar puncture. CSF results were reviewed based on criteria Creutzfeldt-Jakob Disease Foundation criteria. Infection control measures were maintained throughout hospitalization. Results: In total, 34 patients met the inclusion criteria: 8 patients had confirmed CJD and 25 were negative. Medical records were not available for 1 patient, who was excluded. Lumbar puncture was performed on all suspected cases. Of those confirmed cases, the 7 patients who underwent lumber puncture had a positive result for 14-3-3 protein. Also, 5 patients underwent RT-QuIC testing and were found to have a positive result. No further cases of contamination occurred using our protocol. Additionally, 1 patient with suspected CJD underwent a brain biopsy with appropriate precautions after an inconclusive lumbar puncture. Although biospy was negative, the case exemplifies how the initiation of a protocol can optimize the workflow and prevent potentially dangerous exposure. Conclusion: Diagnosis of TSEs remains difficult and is often missed. In our case, lack of suspicion for TSE led to a waste of resources and unnecessary exposure of staff member. It is of utmost importance to consider TSEs in rapidly progressive dementia and to employ appropriate sterile guidelines to prevent contamination of equipment and potential subsequent transmission. Healthcare providers should consider a similar protocol in cases suspicious for TSEs.Funding: NoneDisclosures: None
APA, Harvard, Vancouver, ISO, and other styles
26

Ortega, Victor, and Jose F. Monserrat. "Semantic Distributed Data for Vehicular Networks Using the Inter-Planetary File System." Sensors 20, no. 22 (November 10, 2020): 6404. http://dx.doi.org/10.3390/s20226404.

Full text
Abstract:
Vehicular networks provide means to distribute data among intelligent vehicles, increasing their efficiency and the safety of their occupants. While connected to these networks, vehicles have access to various kinds of information shared by other vehicles and road-side units (RSUs). This information includes helpful resources, such as traffic state or remote sensors. An efficient and fast system to get access to this information is important but unproductive if the data are not appropriately structured, accessible, and easy to process. This paper proposes the creation of a semantic distributed network using content-addressed networking and peer-to-peer (P2P) connections. In this open and collaborative network, RSUs and vehicles use ontologies to semantically represent information and facilitate the development of intelligent autonomous agents capable of navigating and processing the shared data. In order to create this P2P network, this paper makes use of the Inter-Planetary File System (IPFS), an open source solution that provides secure, reliable, and efficient content-addressed distributed storage over standard IP networks using the new QUIC protocol. This paper highlights the feasibility of this proposal and compares it with the state-of-the-art. Results show that IPFS is a promising technology that offers a great balance between functionality, performance, and security.
APA, Harvard, Vancouver, ISO, and other styles
27

Guerra, F., S. Arévalo, A. Alvarez, and J. Miranda. "A quick distributed consensus protocol." Microprocessing and Microprogramming 39, no. 2-5 (December 1993): 111–14. http://dx.doi.org/10.1016/0165-6074(93)90068-v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Bsoul, Abed Al Raoof, Ahmad M. Manasrah, Khalid M. O. Nahar, and Moyawiah Alshanaq. "Quid pro quo LEACH protocol." International Journal of Systems, Control and Communications 9, no. 2 (2018): 106. http://dx.doi.org/10.1504/ijscc.2018.090725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Alshanaq, Moyawiah, Khalid M. O. Nahar, Abed Al Raoof Bsoul, and Ahmad M. Manasrah. "Quid pro quo LEACH protocol." International Journal of Systems, Control and Communications 9, no. 2 (2018): 106. http://dx.doi.org/10.1504/ijscc.2018.10010434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Khazraeializadeh, Soroush, Leon F. Gay, and Alireza Bayat. "Comparative analysis of sewer physical condition grading protocols for the City of Edmonton." Canadian Journal of Civil Engineering 41, no. 9 (September 2014): 811–18. http://dx.doi.org/10.1139/cjce-2014-0077.

Full text
Abstract:
Condition assessment is a key component of successful asset management, and many diverse condition assessment protocols exist for sewer mains. These protocols are used to generate condition grades for sewer mains after inspection. Condition assessment protocols are important because renewal actions for sewers are prioritized based on condition grades. If condition grades assigned to sewers do not reflect actual pipe conditions close enough, the resulting allocation of resources will not be the best. This paper presents a comparison of three possible sewer condition assessment protocols for the City of Edmonton: the Pipeline Assessment and Certification Program quick grading method, the Manual of Sewer Condition Classification fourth edition, and the City of Edmonton’s Sewer Physical Condition Classification Manual. The results show that structural sewer condition grades depend significantly on the protocol used; therefore, protocol selection has significant financial consequences for asset management programs in the city.
APA, Harvard, Vancouver, ISO, and other styles
31

Magi, Lucas Henrique Ribeiro, Isabela Lara Damião, Mylla Cristina Freitas Morais, Richarlla Aparecida Buscariol Silva, Sofia Regina Polizelle, and Danila Fernanda Rodrigues Frias. "EFEITO DE DIFERENTES MÉTODOS DE INDUÇÃO À PUBERDADE SOBRE A RESPOSTA REPRODUTIVA EM NOVILHAS NELORE." Nativa 8, no. 5 (October 27, 2020): 658–62. http://dx.doi.org/10.31413/nativa.v8i5.10921.

Full text
Abstract:
Analisou-se a influência de diferentes protocolos de indução de puberdade em novilhas Nelore por meio da avaliação de dados referentes a 1528 animais relacionados ao resultado da avaliação ginecológica antes da realização do protocolo de indução, escore de condição corporal (ECC), peso médio e idade, protocolo de indução utilizado e resultado do diagnóstico de gestação. Após a tabulação dos dados foram realizadas análises estatísticas por meio do teste de Qui-Quadrado. Com relação ao ECC, 100% das fêmeas foram classificadas entre 3 e 3,5. Quanto a idade e peso, 30,9% possuíam em média 14 meses e pesavam cerca de 270 kg, e 69,1% cerca de 20 meses com peso médio de 320 kg. As novilhas que passaram por protocolo de indução apresentaram 8,3% a mais na taxa de prenhez. O protocolo que utilizou apenas progesterona injetável (P4) de longa ação apresentou os mesmos resultados do tratamento com dispositivo intravaginal reutilizável associado ao cipionato de estradiol. Conclui-se que a progesterona é eficaz para indução de puberdade em novilhas a partir dos 14 meses de idade com peso médio de 270kg, além disso, a utilização da P4 injetável pode ser uma alternativa eficaz para uso como protocolo de indução de novilhas pré-puberes. Palavras-chave: indução de ovulação; progesterona; taxa de concepção; tratamento hormonal. EFFECT OF DIFFERENT PUBERTY-INDUCTION METHODS ON REPRODUCTIVE RESPONSE IN NELLORE HEIFERS ABSTRACT: Examines the influence of different puberty induction protocols in Nellore heifers. Data referring to 1528 Nellore heifers related to the result of gynecological evaluation before the induction protocol; body condition score (BCS); average heifer weight and age; induction protocol used; and result of pregnancy diagnosis. After data tabulation, statistical analyses were performed using the Chi-Square test. For BCS, 100% of the females were classified between 3 and 3.5. In terms of age and weight, 30.9% had an average age of 14 months and weighed approximately 270 kg, whereas 69.1% were around 20 months old, with an average weight of 320 kg. Heifers that underwent an induction protocol showed an 8.3% higher pregnancy rate. The protocol that involved only long-acting injectable progesterone (P4) provided the same results as the treatment with the reusable intravaginal device associated with estradiol cypionate. In conclusion, progesterone is effective for inducing puberty in Nellore heifers from 14 months of age with an average weight of 270 kg. in addition, the use of injectable P4 can be an effective alternative as an induction protocol for prepubertal Nellore heifers. Keywords: conception rate; hormonal treatment; ovulation induction; progesterone.
APA, Harvard, Vancouver, ISO, and other styles
32

Al-kahtani, Mohammed, Lutful Karim, and Nargis Khan. "Efficient Opportunistic Routing Protocol for Sensor Network in Emergency Applications." Electronics 9, no. 3 (March 8, 2020): 455. http://dx.doi.org/10.3390/electronics9030455.

Full text
Abstract:
Routing or forwarding information, such as the location of incidents and victims in a disaster, is significantly important for quick and accurate incident response. However, forwarding such information in disaster areas has been a challenging task for the Wireless Sensor Network as existing networks are affected (destroyed or overused) the disaster. Opportunistic information forwarding can play a vital role in such circumstances. Existing opportunistic routing protocols require huge message transmissions for cluster restoration, which is not energy efficient and results in packet loss. Hence, this paper introduces an energy efficient and reliable opportunistic density cluster-based routing protocol that opportunistically transmits data using a density-clustering protocol for emergency and disaster situations. Simulation results show that the proposed protocol outperforms some existing and well-known routing protocols in terms of network energy consumption, throughput and successful data transmissions.
APA, Harvard, Vancouver, ISO, and other styles
33

Baggan, Vidhu, Devendra Prasad, and Prabhjot Kaur. "Fast Network Path Restoration Through Modified Finite State Machine Model in Border Gateway Protocol." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4394–99. http://dx.doi.org/10.1166/jctn.2019.8531.

Full text
Abstract:
The interminable Internet Connectivity is imperative for the present style of living and the swelling size of network traffic has kindled challenges for establishing a no jitter network. The twists of Routing Protocols and underlying mechanisms were undercover and need to be explored enough. In this paper, we review various dimensions of existing Network Path Restoration mechanisms and proposed a modification in the connection establishment process of Exterior Routing Protocol for quick network path restoration. The de-facto Routing Protocol for inter-autonomous systems is the Border Gateway Routing Protocol (BGP). The connection establishment process of BGP must be modified for the quick recovery from a link failure in a network. The need for TCP/IP, 3 ways handshake process during connection re-establishment in BGP must be mitigated. The goal of this research paper is to design a network, for the modification of the connection establishment process of BGP.
APA, Harvard, Vancouver, ISO, and other styles
34

Tedeschi, Gary J., Shu-Hong Zhu, Sharon E. Cummins, Hee Shin, and My Hanh Nguyen. "Counselling Asian Smokers: Key Considerations for a Telephone Intervention." Journal of Smoking Cessation 8, no. 1 (February 15, 2013): 2–10. http://dx.doi.org/10.1017/jsc.2013.1.

Full text
Abstract:
Detailed descriptions of effective intervention protocols for Asian smokers are uncommon which makes it difficult for others to successfully implement a protocol that has been proven to be effective. This article fills a gap by detailing such a protocol, specifically a telephone counselling intervention for Asian smokers. The protocol was tested in a large randomised trial with Chinese-, Korean-, and Vietnamese-speaking smokers and was shown to significantly increase quit rates. The article describes the approach used to develop the protocol and critical components of the intervention. In addition, the paper compares data on programme participation and satisfaction among Chinese-, Korean-, and Vietnamese-speaking smokers with those for English- and Spanish-speaking smokers from two studies conducted in the US and shows that the former are no less likely to engage in counselling and no less likely to be satisfied with the process.
APA, Harvard, Vancouver, ISO, and other styles
35

Doswald-Beck, Louise. "Le nouveau Protocole sur les armes à laser aveuglantes." Revue Internationale de la Croix-Rouge 78, no. 819 (June 1996): 289–321. http://dx.doi.org/10.1017/s0035336100049480.

Full text
Abstract:
La première Conférence d'examen de la Convention de 1980 sur certaines armes classiques a adopté le 13 octobre 1995, lors de sa première session, un nouveau protocole intitulé «Protocole relatif aux armes à laser aveuglantes» (Protocole IV). La Convention de 1980 se compose de la Convention proprement dite (contenant des dispositions techniques — champ d'application, entrée en vigueur et amendements, notamment) ainsi que des protocoles annexés, énonçant les règles de fond relatives à certaines armes. Bien qu'un grand nombre d'armes classiques aient été discutées pendant les travaux préparatoires qui ont précédé l'adoption de la Convention, trois protocoles seulement ont été adoptés en 1980.
APA, Harvard, Vancouver, ISO, and other styles
36

Choe, Dong-Hwan, Jia-Wei Tay, Kathleen Campbell, Hoeun Park, Les Greenberg, and Michael K. Rust. "Development and Demonstration of Low-Impact IPM Strategy to Control Argentine Ants (Hymenoptera: Formicidae) in Urban Residential Settings." Journal of Economic Entomology 114, no. 4 (May 10, 2021): 1752–57. http://dx.doi.org/10.1093/jee/toab079.

Full text
Abstract:
Abstract Argentine ants are one of the most common nuisance pest ants treated by pest management professionals (PMPs) in southern and western urban residential areas of the United States. Two new technologies (spraying with a pheromone adjuvant and using a biodegradable hydrogel bait delivery method) were used to develop a unique low-impact integrated pest management (IPM) protocol for Argentine ants in urban residential settings. The IPM protocol included a one-time perimeter spray treatment with 0.03% fipronil (mixed with a pheromone adjuvant) at the beginning of the ant season to achieve a quick knockdown. The initial spray application was followed by a biodegradable hydrogel baiting with 1% boric acid as a maintenance treatment. This low-impact IPM protocol was compared with two other conventional methods: (1) one initial fipronil application and one pyrethroid spray application for maintenance, or (2) one initial fipronil application and one essential oil insecticide spray application for maintenance. Based on Argentine ant foraging activity, the protocols were compared for their control efficacy. Insecticide use information and treatment time were also recorded and compared among different treatment protocols. Our results provided empirical data to support the effectiveness and economic feasibility of the low-impact IPM protocol for managing Argentine ants in urban residential settings.
APA, Harvard, Vancouver, ISO, and other styles
37

Tonacci, Alessandro, Alessandro Dellabate, Andrea Dieni, Lorenzo Bachi, Francesco Sansone, Raffaele Conte, and Lucia Billeci. "Can Machine Learning Predict Stress Reduction Based on Wearable Sensors’ Data Following Relaxation at Workplace? A Pilot Study." Processes 8, no. 4 (April 10, 2020): 448. http://dx.doi.org/10.3390/pr8040448.

Full text
Abstract:
Nowadays, psychological stress represents a burdensome condition affecting an increasing number of subjects, in turn putting into practice several strategies to cope with this issue, including the administration of relaxation protocols, often performed in non-structured environments, like workplaces, and constrained within short times. Here, we performed a quick relaxation protocol based on a short audio and video, and analyzed physiological signals related to the autonomic nervous system (ANS) activity, including electrocardiogram (ECG) and galvanic skin response (GSR). Based on the features extracted, machine learning was applied to discriminate between subjects benefitting from the protocol and those with negative or no effects. Twenty-four healthy volunteers were enrolled for the protocol, equally and randomly divided into Group A, performing an audio-video + video-only relaxation, and Group B, performing an audio-video + audio-only protocol. From the ANS point of view, Group A subjects displayed a significant difference in the heart rate variability-related parameter SDNN across the test phases, whereas both groups displayed a different GSR response, albeit at different levels, with Group A displaying greater differences across phases with respect to Group B. Overall, the majority of the volunteers enrolled self-reported an improvement of their well-being status, according to structured questionnaires. The use of neural networks helped in discriminating those with a positive effect of the relaxation protocol from those with a negative/neutral impact based on basal autonomic features with a 79.2% accuracy. The results obtained demonstrated a significant heterogeneity in autonomic effects of the relaxation, highlighting the importance of maintaining a structured, well-defined protocol to produce significant benefits at the ANS level. Machine learning approaches can be useful to predict the outcome of such protocols, therefore providing subjects less prone to positive responses with personalized advice that could improve the effect of such protocols on self-relaxation perception.
APA, Harvard, Vancouver, ISO, and other styles
38

Teles, Roselin Padilha, Denise Macarini Teresa, Mariana Comin, and Valdemira Santina Dagostin. "PROTOCOLO DO MANEJO DA SEDE NA SALA DE RECUPERAÇÃO PÓS-ANESTÉSICA EM UM HOSPITAL PRIVADO NO SUL DE SANTA CATARINA." Revista Interdisciplinar de Estudos em Saúde 7, no. 1 (November 29, 2018): 335–50. http://dx.doi.org/10.33362/ries.v7i1.1350.

Full text
Abstract:
O estudo visa conhecer a percepção dos colaboradores da Sala de Recuperação Pós Anestésica (SRPA) de um hospital do sul de Santa Catarina, sobre o protocolo de manejo da sede, avaliando a implantação, as fragilidades e potencialidades do protocolo para os pacientes. Sede relaciona-se com aspectos fisiológicos, psicológicos e socioculturais, pacientes com sede dão respostas variadas a esse desconforto. Os fatores responsáveis pela sensação da sede são múltiplos, entre eles o jejum, as drogas utilizadas durante o procedimento anestésico cirúrgico, a intubação endotraqueal, o sangramento intra-operatório, a desidratação e a idade do paciente. Trata-se de um estudo qualitativo, descritivo e de campo, com a participação de 19 colaboradores da sala de recuperação pós-anestésicos através de entrevista semiestruturada. Os resultados apontam que os colaboradores estão envolvidos e participam da educação permanente desenvolvida pela instituição referente ao protocolo do manejo da sede, bem como, são conhecedores do processo. Os colaboradores concordam na importância da aplicação do protocolo, para que assim a recuperação do paciente torne-se mais eficiente e rápida. Notou-se que a maioria concorda com os resultados imediatos que o protocolo apresenta na SRPA e sugerem a aplicação assídua do mesmo.Palavras-chave: Sede. Enfermagem. Protocolo. ABSTRACT: The study aims to meet the employees ' perception of the room Post Anesthesia recovery (PACU) of a hospital in the South of Santa Catarina, on the management of the headquarters protocol, assessing the deployment, the weaknesses and potentialities of Protocol for patients. Headquarters deals with physiological, psychological and socio-cultural aspects, patients give responses varied based on the discomfort. The factors responsible for the sensation of thirst are multiple, including fasting, the drugs used during anesthesia, endotracheal intubation, surgical perioperative bleeding, dehydration and the patient's age. This is a qualitative study, descriptive and, with the participation of 19 employees of recovery pós-anestésicos through semi-structured interview. The results show that employees are engaged and participate in continuing education developed by the institution for the management of the headquarters protocol as well, are knowledgeable of the process. Employees agree on the importance of application of the Protocol, so that the recovery of the patient become more efficient and quick. It was noted that most agree with the immediate results that the Protocol features in the PACU and suggest the regular application of the same.Keywords: Headquarters. Nursing. Protocol.
APA, Harvard, Vancouver, ISO, and other styles
39

Prekeges, J. "Quick-Reference Protocol Manual for Nuclear Medicine Technologists." Journal of Nuclear Medicine Technology 42, no. 3 (June 26, 2014): 242. http://dx.doi.org/10.2967/jnmt.114.143610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Priebe, Carly S., John Atkinson, and Guy Faulkner. "Run to Quit: Program design and evaluation protocol." Mental Health and Physical Activity 11 (October 2016): 38–45. http://dx.doi.org/10.1016/j.mhpa.2016.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Senouci, Oussama, Zibouda Aliouat, and Saad Harous. "A review of routing protocols in internet of vehicles and their challenges." Sensor Review 39, no. 1 (January 21, 2019): 58–70. http://dx.doi.org/10.1108/sr-08-2017-0168.

Full text
Abstract:
Purpose This paper is a review of a number routing protocols in the internet of vehicles (IoV). IoV emphasizes information interaction among humans, vehicles and a roadside unit (RSU), within which routing is one of the most important steps in IoV network. Design/methodology/approach In this paper, the authors have summarized different research data on routing protocols in the IoV. Several routing protocols for IoV have been proposed in the literature. Their classification is made according to some criteria such as topology-based, position-based, transmission strategy and network structure. This paper focuses on the transmission strategy criteria. There exist three types of protocols that are based on this strategy: unicast protocol, broadcast protocols and multicast protocols. This later type is classified into two subclasses: geocast and cluster-based protocols. The taxonomy of the transmission strategy is presented in this study. We discuss the advantages and disadvantages of each type with a general comparison between the five types. Findings The authors can deduce that many challenges are encountered when designing routing protocols for IoV. Originality/value A simple and well-explained presentation of the functioning of the IoV is provided with a comparison among each categories of protocols is well presented along with the advantages and disadvantages of each type. The authors examined the main problems encountered during the design of IoV routing protocol, such as the quick change of topology, the frequent disconnection, the big volume of data to be processed and stored in the IoV, and the problem of network fragmentation. This work explores, compares existing routing protocols in IoV and provides a critical analysis. For that, the authors extract the challenges and propose future perspectives for each categories of protocols.
APA, Harvard, Vancouver, ISO, and other styles
42

Zizka, Vera M. A., Florian Leese, Bianca Peinert, and Matthias F. Geiger. "DNA metabarcoding from sample fixative as a quick and voucher-preserving biodiversity assessment method." Genome 62, no. 3 (March 2019): 122–36. http://dx.doi.org/10.1139/gen-2018-0048.

Full text
Abstract:
Metabarcoding is a powerful, increasingly popular tool for biodiversity assessment, but it still suffers from some drawbacks (specimen destruction, separation, and size sorting). In the present study, we tested a non-destructive protocol that excludes any sample sorting, where the ethanol used for sample preserving is filtered and DNA is extracted from the filter for subsequent DNA metabarcoding. When tested on macroinvertebrate mock communities, the method was widely successful but was unable to reliably detect mollusc taxa. Three different protocols (no treatment, shaking, and freezing) were successfully applied to increase DNA release to the fixative. The protocols resulted in similar success in taxa detection (6.8–7 taxa) but differences in read numbers assigned to taxa of interest (33.8%–93.7%). In comparison to conventional bulk sample metabarcoding of environmental samples, taxa with pronounced exoskeleton and small-bodied taxa were especially underrepresented in ethanol samples. For EPT (Ephemeroptera, Plecoptera, Trichoptera) taxa, which are important for determining stream ecological status, the methods detected 46 OTUs in common, with only 4 unique to the ethanol samples and 10 to the bulk samples. These results indicate that fixative-based metabarcoding is a non-destructive, time-saving alternative for biodiversity assessments focussing on taxa used for ecological status determination. However, for a comprehensive assessment on total invertebrate biodiversity, the method may not be sufficient, and conventional bulk sample metabarcoding should be applied.
APA, Harvard, Vancouver, ISO, and other styles
43

Jiao, Yue, Ying Han, Xin Li, Yi-gong Fang, Zhao-hui Liu, Wen-na Zhou, Jin-cao Zhou, et al. "Comparison of Body, Auricular, and Abdominal Acupuncture Treatments for Insomnia Differentiated as Internal Harassment of Phlegm-Heat Syndrome: An Orthogonal Design." Evidence-Based Complementary and Alternative Medicine 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/578972.

Full text
Abstract:
Objective.To identify the optimum treatment protocol for insomnia among auricular, body, and abdominal needling methods.Methods.A three-factor (3 needling protocols) and three-level experimental scheme was designed based on orthogonal method. 54 patients of insomnia differentiated as internal harassment of phlegm-heat syndrome were given two courses of acupuncture treatment (each with 20 times of acupuncture). The therapeutic effects were evaluated by comparing the Pittsburgh sleep quality index (PSQI), Hamilton Depression Scale (HAMD) scores, and Hamilton Anxiety Scale (HAMA) scores of patients before treatment, after one course of treatment, and after two courses of treatment as well as one month after treatment.Results.Body, auricular, and abdominal acupuncture treatments all alleviated symptoms of insomnia, depression, and anxiety, but body and auricular acupuncture had stronger therapeutic effects.Conclusions.Body acupuncture at basic points shall be given priority in protocol selection for insomnia. The second-best choice is auricular acupuncture with basic points combined with points based on Traditional Chinese Medicine (TCM) theories. Abdominal needling with very quick effect can be an alternative protocol with basic points combined with syndrome differentiation points.
APA, Harvard, Vancouver, ISO, and other styles
44

Fuditia, Megacaesa Fuditia, and Anis Mashdurohatun. "PROTECTION AGAINST RECIPIENTS NOTARY DEED THAT ALLEGEDLY PROTOCOL TO THE LEGAL ISSUE IN SEMARANG." Jurnal Akta 7, no. 2 (August 15, 2020): 177. http://dx.doi.org/10.30659/akta.v7i2.7888.

Full text
Abstract:
Notary Appointment as Notary Protocol holders and storage required to accept the delegation of the protocol, because at the beginning of his run, every Notaries are required to make a statement about its willingness to accommodate the move Notary Protocol, quit, or died. As a holder of the protocol but can learn a lot there is also a consequence of the receipt of such deed is when there is a legal problem, as the holder of the protocol also participated as a defendant or summoned by investigators in order to bring that existed at the Notary deed holder protocol. However, it has become a legal obligation Notary. The purpose of this research are: 1) To analyze and assess the extent of legal protection against protocol receiver notary deed allegedly related legal issues in the city of Semarang. 2) To analyze and assess the barriers in the legal protection of the receiving notary deed allegedly protocols about legal issues in the city of Semarang. 3) To formulate legal protection against protocol receiver notary deed was allegedly associated legal problems in the future.Notary receiver and storage protocol is not responsible for the contents of the deed of the substance or the above protocol receives. UUJN enactment, not without obstacles in its implementation. It was mainly related to the legal protection of a notary. Those barriers between them, yet the formation of the Implementing Regulation and Role Change THIS UUJN to socialize UUJN Changes in certain areas less. Legal protection should be given to the notary deed protocol receiver must be in accordance with Law Notary Article 66 paragraph (1) of Law No. 2 of 2014 on the Amendment of the Law of the Republic of Indonesia Number 30 Year 2004 on Notary.Keywords : Deed, Legal, Notary, Legal Protection, the Protocol.
APA, Harvard, Vancouver, ISO, and other styles
45

Wardoyo, Eustachius Hagni, Yunita Sabrina, Dewi Suryani, and Ramses Indriawan. "Optimasi Ekstraksi Dna Dari Spesimen Feses Pasien Kanker Kolorektal." Indonesian Journal of Infectious Diseases 6, no. 1 (July 29, 2020): 41. http://dx.doi.org/10.32667/ijid.v6i1.108.

Full text
Abstract:
Latar Belakang: Pasien kanker kolorektal sering mengalami diare, baik itu karena konsekuensi langsung akibat penyakit, efek samping kemoterapi/radioterapi, atau karena adanya infeksi. Perubahan konsistensi feses pasien kolorektal dalam kemoterapi menyebabkan perubahan komposisi feses (jumlah sel bakteri, komposisi inhibitor) yang berbeda pada feses manusia normal. Konsekuensinya ekstraksi DNA bakterial dari feses pasien kanker kolorektal dalam kemoterapi perlu dilakukan optimasi. Tujuan penelitian untuk mendapatkan protokol DNA optimal dari feses cair pasien kolorektal. Metode: Ekstraksi DNA menggunakan Quick-DNA™ Fecal/Soil Microbe Miniprep Kit (Zymoresearch). Terdapat 3 pilihan protokol yang dilakukan, yang mana 2 protokol lainnya yang merupakan modifikasi dari protokol standar yang mengikuti prinsip: 1. Disrupsi mekanis untuk memisahkan sel bakteri dari materi feses dengan modifikasi lama sentrifugasi, 2. Proses binding DNA dengan modifikasi kecepatan sentrifugasi, 3. Proses mendapatkan DNA elusi dengan modifikasi gradien volume buffer DNA. Protokol standar diaplikasikan pada feses kontrol berpasangan usia dan jenis kelamin dan feses sampel, sedang 2 protokol lainnya diaplikasikan hanya pada feses sampel. Rasio absorbansi A260/280 ≥ 1.8 menggunakan Nanodrop™ di aplikasikan pada konsentrasi DNA yang dinyatakan sebagai DNA murni. Pemeriksaan dilakukan sebanyak 3 kali dan reratanya dilaporkan dalam penelitian ini. Hasil: Rasio absorbansi sebesar A260/280 ≥1.8 didapatkan pada protocol ketiga yakni dengan rerata rasio absorbansi A260/280 1.81, sedangkan pada protokol 2 dan 3 feses sampel menunjukkan rerata rasio absorbansi A260/280 1.79 dan 1.81. Kesimpulan: Protokol ketiga dalam penelitian ini merupakan protokol optimal untuk ekstraksi DNA pada sampel feses pasien pasien kanker kolorektal paska keoterapi
APA, Harvard, Vancouver, ISO, and other styles
46

Danner, Gábor, Árpád Berta, István Hegedűs, and Márk Jelasity. "Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation." Security and Communication Networks 2018 (May 14, 2018): 1–15. http://dx.doi.org/10.1155/2018/6728020.

Full text
Abstract:
Privacy and security are among the highest priorities in data mining approaches over data collected from mobile devices. Fully distributed machine learning is a promising direction in this context. However, it is a hard problem to design protocols that are efficient yet provide sufficient levels of privacy and security. In fully distributed environments, secure multiparty computation (MPC) is often applied to solve these problems. However, in our dynamic and unreliable application domain, known MPC algorithms are not scalable or not robust enough. We propose a light-weight protocol to quickly and securely compute the sum query over a subset of participants assuming a semihonest adversary. During the computation the participants learn no individual values. We apply this protocol to efficiently calculate the sum of gradients as part of a fully distributed minibatch stochastic gradient descent algorithm. The protocol achieves scalability and robustness by exploiting the fact that in this application domain a “quick and dirty” sum computation is acceptable. We utilize the Paillier homomorphic cryptosystem as part of our solution combined with extreme lossy gradient compression to make the cost of the cryptographic algorithms affordable. We demonstrate both theoretically and experimentally, based on churn statistics from a real smartphone trace, that the protocol is indeed practically viable.
APA, Harvard, Vancouver, ISO, and other styles
47

Oucho, John. "Prospects for free movement in the East African Community." Regions and Cohesion 3, no. 3 (December 1, 2013): 103–22. http://dx.doi.org/10.3167/reco.2013.030306.

Full text
Abstract:
This article traces the evolution of regional integration in East Africa, discussing its nature, scope, triumphs, and challenges. It reviews the Protocol on the Establishment of the East African Community Common Market (PEEACCM), which develops aspects of free movement policy that were implicit in earlier editions of the EAC regional integration. The article then addresses the several challenges that exist to free movement in the EAC as it endeavors to usher in the larger Southern and East Africa COMESA–EAC–SADC Tripartite Agreement and even wider continental-level coordination. It concludes that a managed migration policy rather than free movement might be more appropriate. Spanish Este artículo traza la evolución de la integración regional en África del Este, discutiendo su naturaleza, alcances, triunfos y desafíos. Se revisa el Protocolo para el Establecimiento del Mercado Común de la Comunidad de África del Este (conocido como Protocolo de Mercado Común), el cuál desarrolla aspectos de la política de libre circulación que estaban implícitas en las previas ediciones sucesivas a la integración regional en la Comunidad de África del Este (CAE). Posteriormente, el artículo aborda los diversos desafíos que existen para la libre circulación en la CAE en contraste con los esfuerzos de la misma CAE por ser la vanguardia en el amplio Acuerdo Tripartita COMESA-CAE-SADC, que abarca países del sur y del este de África, y en la coordinación a nivel continental aún más amplia. El autor llega a la conclusión de que una política de gestión de la migración en lugar de libre circulación podría ser más apropiada. French Cet article retrace l'évolution de l'intégration régionale en Afrique de l'Est (AE), en discutant de sa nature, de sa portée, des succès et des défis qui se posent à elle. Il examine le Protocole portant sur la création du Marché commun d'Afrique orientale communautaire (PEACCM en anglais), qui développe des aspects de la politique de libre circulation qui étaient implicites dans les éditions précédentes des accords d'intégration de l'AE. L'article aborde ensuite les nombreux défis qui se posent à la libre circulation dans la CAE, comment les CAE s'efforcent également d'inaugurer la plus grande Afrique australe et orientale de l'Accord tripartite COMESA-EAC-SADC et de la coordination encore plus large au niveau continental. Il conclut qu'une politique de gestion des migrations pourrait être plus appropriée que la libre circulation.
APA, Harvard, Vancouver, ISO, and other styles
48

Cai, Hong Zhuan, and Yong Liu. "Adaptive USB Fast Charger Design Based on Quick Charge 2.0 Protocol." Advanced Materials Research 852 (January 2014): 357–60. http://dx.doi.org/10.4028/www.scientific.net/amr.852.357.

Full text
Abstract:
This paper introduces the working principle of adaptive USB fast charging based on Quick Charge 2.0 protocol, and introduces in detail wall plug charger interface chip CHY100 with supporting this kind of protocol. CHY100 integrates all the necessary elements, can add Quick Charge 2.0 platform features to the AC-DC wall plug charger.
APA, Harvard, Vancouver, ISO, and other styles
49

Alba, Claudio, Alicia C. Marin, Adrian G. McNicholl, Ana Montalban-Arques, Irene Mora-Gutierrez, Antonio José Sánchez-Arroyo, Tamara Soler, et al. "A quick flow cytometry protocol to assess Helicobacter pylori viability." Journal of Microbiological Methods 177 (October 2020): 106043. http://dx.doi.org/10.1016/j.mimet.2020.106043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Onyeabo, Ebele Angela. "Resource curse and impunity gaps: National inadequacies, international responses and regional promises / Malédiction des ressources et impunité: Insuffisances nationales, réponses internationales et promesses régionales." Journal of the African Union Commission on International Law 2021 (2021): 269–307. http://dx.doi.org/10.47348/aucil/2021/a8.

Full text
Abstract:
Kleptocracy has been a constant feature in Africa. The fallout of this relentless pursuit for state funds continues to threaten not only the economy, but also the security and stability of the region. Limited domestic judicial accountability for ‘grand corruption’ has exacerbated this problem, rendering both United Nations (UN) and African Union (AU) anti-corruption conventions ineffective. As a possible solution, the AU has adopted the Malabo Protocol, which creates a criminal chamber or a Regional Criminal Court (RCC) within the newly formed African Court of Justice and Human Rights (ACJHR), that merges the already existing AU courts. This represents the first supranational institution to tackle ‘grand corruption’ as defined in art 28I of the Protocol. This paper discusses the link between corruption, the ‘resource curse’ and regional security. It evaluates the efficacy of art 28I of the Protocol within the context of other mechanisms developed to address grand corruption globally, like transparency initiatives and the exercise of jurisdictional sovereignty over transnational crimes. The paper comments on the possible relationship between the International Criminal Court (ICC) and the RCC and proposes steps that the RCC could take to overcome anticipated challenges. La kleptocracie est une caractéristique constante en Afrique. Les retombées de cet engouement effréné pour vider les caisses de l’État sont une menace non seulement pour l’économie, mais aussi pour la sécurité et stabilité de la région. La responsabilité judiciaire nationale limitée pour les crimes de « grande corruption » ont exacerbé ce problème rendant de ce fait inefficaces les conventions des Nations unies (NU) et l’Union africaine (UA) contre la corruption. Comme solution, l’UA a adopté le protocole de Malabo qui crée une chambre criminelle ou un Tribunal Criminel Régional (TCR) au sein de la Cour africaine de Justice et des Droits de l’Homme (CAJDH) nouvellement créée, qui fusionne les tribunaux déjà existants de l’UA. Ceci représente la première institution supranationale qui tacle la « grande corruption » telle que définit par l’article 281 du Protocole. Cet article examine le lien entre la corruption, la « malédiction des ressources » et la sécurité régionale. Il évalue l’efficacité de l’article 281 du Protocole vis-à-vis d’autre mécanismes développés pour combattre la corruption à l’échelon mondial tels que les initiatives de transparence et l’exercice de la souveraineté juridictionnelle sur les crimes transnationaux. Cet article commente sur la possibilité d’une relation entre la Cour pénale internationale (CPI) et le TCR et propose des mesures que le TCR pourrait prendre afin de pallier aux problèmes éventuels.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography