Academic literature on the topic 'Strengthening protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strengthening protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Strengthening protocol"

1

Zhang, Bo, Wei-Xu Shi, Jian Wang, and Chao-Jing Tang. "Quantum direct communication protocol strengthening against Pavičić’s attack." International Journal of Quantum Information 13, no. 07 (2015): 1550052. http://dx.doi.org/10.1142/s0219749915500525.

Full text
Abstract:
A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state [Formula: see text]-[Formula: see text] quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Yongjian, Bohua Zhan, and Jun Pang. "Mechanizing the CMP Abstraction for Parameterized Verification." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1324–50. http://dx.doi.org/10.1145/3649858.

Full text
Abstract:
Parameterized verification is a challenging problem that is known to be undecidable in the general case. ‍is a widely-used method for parameterized verification, originally proposed by Chou, Mannava and Park in 2004. It involves abstracting the protocol to a small fixed number of nodes, and strengthening by auxiliary invariants to refine the abstraction. In most of the existing applications of CMP, the abstraction and strengthening procedures are carried out manually, which can be tedious and error-prone. Existing theoretical justification of the ‍method is also done at a high level, without detailed descriptions of abstraction and strengthening rules. In this paper, we present a formally verified theory of ‍in Isabelle/HOL, with detailed, syntax-directed procedure for abstraction and strengthening that is proven correct. The formalization also includes correctness of symmetry reduction and assume-guarantee reasoning. We also describe a tool AutoCMP for automatically carrying out abstraction and strengthening in , as well as generating Isabelle proof scripts showing their correctness. We applied the tool to a number of parameterized protocols, and discovered some inaccuracies in previous manual applications of ‍to the FLASH cache coherence protocol.
APA, Harvard, Vancouver, ISO, and other styles
3

Krzywiecki, Łukasz, and Tomasz Wlisłocki. "Deniable Key Establishment Resistance against eKCI Attacks." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/7810352.

Full text
Abstract:
In extended Key Compromise Impersonation (eKCI) attack against authenticated key establishment (AKE) protocols the adversary impersonates one party, having the long term key and the ephemeral key of the other peer party. Such an attack can be mounted against variety of AKE protocols, including 3-pass HMQV. An intuitive countermeasure, based on BLS (Boneh–Lynn–Shacham) signatures, for strengthening HMQV was proposed in literature. The original HMQV protocol fulfills the deniability property: a party can deny its participation in the protocol execution, as the peer party can create a fake protocol transcript indistinguishable from the real one. Unfortunately, the modified BLS based version of HMQV is not deniable. In this paper we propose a method for converting HMQV (and similar AKE protocols) into a protocol resistant to eKCI attacks but without losing the original deniability property. For that purpose, instead of the undeniable BLS, we use a modification of Schnorr authentication protocol, which is deniable and immune to ephemeral key leakages.
APA, Harvard, Vancouver, ISO, and other styles
4

Shohruh, Ibadullayev Sheraliyevich. "STRENGTHENING IMPLEMENTATION OF WPA3 SECURITY PROTOCOL FOR WIRELESS NETWORK." MEDICINE, PEDAGOGY AND TECHNOLOGY: THEORY AND PRACTICE 3, no. 1 (2025): 36–41. https://doi.org/10.5281/zenodo.14620126.

Full text
Abstract:
This article wireless networks security to increase in order WPA3 protocol current of actual analysis and makes. The research during the WPA protocol evolution, in particular, WPA3 technology of the new features, for example, Simultaneous Authentication of Equals (in sa) engine and Individualized data encryption have been applied. WPA3 is not only data to shifrni will improve, but network security threats , minimizing the possibility of returns. Results that it shows, WPA3 protocol for wireless networks for new security standard provides and data protect to for optimal solution.
APA, Harvard, Vancouver, ISO, and other styles
5

Tao, Jiaye, Chao Hong, Yun Fu, et al. "Coverage-guided fuzz testing method based on reinforcement learning seed scheduling." Journal of Physics: Conference Series 2816, no. 1 (2024): 012107. http://dx.doi.org/10.1088/1742-6596/2816/1/012107.

Full text
Abstract:
Abstract The existing fuzz testing methods for industrial control protocols suffer from insufficient coverage, false positives, and an inability to handle protocol semantics. This paper proposes a reinforcement learning-based seed scheduling coverage-guided fuzz testing method. Building upon coverage-guided fuzz testing techniques, we integrate reinforcement learning with seed scheduling to optimize the seed selection strategy, thereby enhancing the efficiency of protocol vulnerability detection. Experimental results demonstrate the feasibility and effectiveness of this approach. Through reinforcement learning guidance, seed scheduling is optimized, thereby strengthening the performance of fuzz testing in exploring vulnerabilities in industrial control protocols.
APA, Harvard, Vancouver, ISO, and other styles
6

Ferber, Reed, Lori Bolgla, Jennifer E. Earl-Boehm, Carolyn Emery, and Karrie Hamstra-Wright. "Strengthening of the Hip and Core Versus Knee Muscles for the Treatment of Patellofemoral Pain: A Multicenter Randomized Controlled Trial." Journal of Athletic Training 50, no. 4 (2015): 366–77. http://dx.doi.org/10.4085/1062-6050-49.3.70.

Full text
Abstract:
Context Patellofemoral pain (PFP) is the most common injury in running and jumping athletes. Randomized controlled trials suggest that incorporating hip and core strengthening (HIP) with knee-focused rehabilitation (KNEE) improves PFP outcomes. However, no randomized controlled trials have, to our knowledge, directly compared HIP and KNEE programs. Objective To compare PFP pain, function, hip- and knee-muscle strength, and core endurance between KNEE and HIP protocols after 6 weeks of rehabilitation. We hypothesized greater improvements in (1) pain and function, (2) hip strength and core endurance for patients with PFP involved in the HIP protocol, and (3) knee strength for patients involved in the KNEE protocol. Design Randomized controlled clinical trial. Setting Four clinical research laboratories in Calgary, Alberta; Chicago, Illinois; Milwaukee, Wisconsin; and Augusta, Georgia. Patients or Other Participants Of 721 patients with PFP screened, 199 (27.6%) met the inclusion criteria (66 men [31.2%], 133 women [66.8%], age = 29.0 ± 7.1 years, height = 170.4 ± 9.4 cm, weight = 67.6 ± 13.5 kg). Intervention(s) Patients with PFP were randomly assigned to a 6-week KNEE or HIP protocol. Main Outcome Measure(s) Primary variables were self-reported visual analog scale and Anterior Knee Pain Scale measures, which were conducted weekly. Secondary variables were muscle strength and core endurance measured at baseline and at 6 weeks. Results Compared with baseline, both the visual analog scale and the Anterior Knee Pain Scale improved for patients with PFP in both the HIP and KNEE protocols (P < .001), but the visual analog scale scores for those in the HIP protocol were reduced 1 week earlier than in the KNEE group. Both groups increased in strength (P < .001), but those in the HIP protocol gained more in hip-abductor (P = .01) and -extensor (P = .01) strength and posterior core endurance (P = .05) compared with the KNEE group. Conclusions Both the HIP and KNEE rehabilitation protocols produced improvements in PFP, function, and strength over 6 weeks. Although outcomes were similar, the HIP protocol resulted in earlier resolution of pain and greater overall gains in strength compared with the KNEE protocol.
APA, Harvard, Vancouver, ISO, and other styles
7

Hermanns, Christina, Reed Coda, Sana Cheema, et al. "Variability in Rehabilitation Protocols after Superior Labrum Anterior Posterior Surgical Repair." Kansas Journal of Medicine 14 (October 14, 2021): 243–48. http://dx.doi.org/10.17161/kjm.vol14.15286.

Full text
Abstract:
Introduction. Rehabilitation after a superior labral anterior posterior (SLAP) repair is an important aspect of patient outcomes, however, no standardized rehabilitation protocol has been defined. The purpose of this paper is to assess the variability of rehabilitation after SLAP repair to understand the need for standardization to improve patient outcomes. Methods. Protocols for SLAP repairs were collected through a search for Academic Orthopedic Programs and a general google search using the terms “[Program Name (if applicable)] SLAP Repair Rehab Protocol”. Protocols were compared by sling, range of motion (ROM), physical therapy, return to sport (RTS), return to throwing, and biceps engagement/ biceps tenodesis recommendations. Protocols for non-operative or generalized shoulders were excluded. Results. Sixty protocols were included. A total of 61.7% (37/60) recommended a sling for four to six weeks and 90% (54/60) included a full ROM recommendation, but time was variable. There were different exercises recommended, but pendulum swings were recommended by 53% (32/60), submaximal isometrics by 55% (33/60), and scapular strengthening by 65% (39/60). Of the sixty protocols, 33% (20/60) recommended return to sports in 24 weeks and 38.3% (23/60) recommended allowing throwing in 16 weeks. Conclusion. There was variability in protocols for SLAP repair, especially time until full ROM, RTS, and biceps strengthening. Time in sling and scapular strengthening were the least variable. A lack of specificity within protocols in what return to throwing meant for functional ability made it difficult to compare protocols. Considering the large number of Orthopedic programs, a relatively small number had published protocols. Further studies are needed to evaluate a standardized post-operative rehabilitation for SLAP repairs to improve outcomes.
APA, Harvard, Vancouver, ISO, and other styles
8

Jellad, Anis, Amine Kalai, Mohamed Guedria, et al. "Combined Hip Abductor and External Rotator Strengthening and Hip Internal Rotator Stretching Improves Pain and Function in Patients With Patellofemoral Pain Syndrome: A Randomized Controlled Trial With Crossover Design." Orthopaedic Journal of Sports Medicine 9, no. 4 (2021): 232596712198972. http://dx.doi.org/10.1177/2325967121989729.

Full text
Abstract:
Background: Active rehabilitation has an important role in the management of patellofemoral pain syndrome (PFPS). Although some studies have shown the benefit of hip-muscle strengthening, the effect of combining hip-muscle stretching with strengthening has not yet been defined. Purpose: To evaluate the effect of combined strengthening of the hip external rotators and abductors and stretching of the hip internal rotators on pain and function in patients with PFPS. Study Design: Randomized controlled trial; Level of evidence, 2. Methods: A total of 109 patients with PFPS (75 female and 34 male; mean age, 31.6 ± 10.8 years) were first randomly assigned to protocol A (n = 67) of the A-B arm (AB group; standard rehabilitation) or protocol B (n = 42) of the B-A arm (BA group; standard rehabilitation with strengthening of the hip external rotators and abductors and stretching of the hip internal rotators). Each protocol consisted of 3 sessions a week for 4 weeks. After a washout period, corresponding to a symptom-free period, rehabilitation programs were crossed over. A visual analog scale (VAS) evaluating perceived pain, the Functional Index Questionnaire (FIQ), and the Kujala score were administered at baseline, the end of each rehabilitation protocol, and 12 weeks after the completion of the second protocol for each group. Results: Until the final follow-up, VAS, FIQ, and Kujala scores were significantly improved in both the A-B and B-A arms ( P < .05 for all). Compared with protocol A, protocol B provided significant improvement in terms of pain and function in both the BA (VAS and Kujala; P < .001) and AB (VAS and Kujala; P < .001) groups. Conclusion: Combined strengthening of the hip abductors and external rotators with stretching of the hip internal rotators provided better outcomes, which were maintained for at least 12 weeks, in terms of pain and function in patients with PFPS.
APA, Harvard, Vancouver, ISO, and other styles
9

Imeri, Behrooz, and Mehdi Gheitasi. "Hip Abductor Muscles Strengthening's Effect on Lower Extremity's Function of Runners With Illitotibial Syndrome." Journal of Exercise Science and Medicine 12, no. 1 (2020): 189–200. http://dx.doi.org/10.32598/jesm.12.1.6.

Full text
Abstract:
Introduction: Iliotibial Band Syndrome (ITBS) is among the most common injuries in distance runners. Thus, the present study investigated the effect of a special strengthening exercise program for abductor’s muscles according to NSCA protocol, on pain reduction and lower extremity function improvement among elite distance runners with ITBS. Materials and Methods: The subjects of the present study were 32 elite distance runners who were randomly divided into two groups of control and experimental (n=16/group). The experimental group performed the exercise program for 8 weeks; however, the control group followed their routine program. The pain was assessed by the Visual Analogue Scale of pain (VAS) and the lower extremity function was assessed by the Lower Extremity Functional Scale (LEFS). In the statistical procedure, the repeated-measures Analysis of Variance (ANOVA) and Bonferroni test was applied to determine the within-group and between-groups differences of the study variables, and for assessing the stability level of protocols’ effect on the experimental group and comparing the stages, respectively. The significance level was considered 0.05, test power as 95%, and effect size as 0.7; SPSS was used for all data analyses. Results: The present study data indicated that the strengthening exercise program on hip abductor muscles caused a significant decrease in pain (P=0.0001). The lower extremity function manifested a significant improvement in the experimental group after 8 weeks of strengthening exercise protocol (P=0.0001); it was durable even 3 months after the end of the exercise program. Conclusion: Hip abductor muscle strengthening, based on NSCA protocol, can be an effective approach in reducing pain and improving lower extremity function in elite distance runners with ITBS.
APA, Harvard, Vancouver, ISO, and other styles
10

Stephen, Geovinson George, Kamalakannan Mohanan, Praveen Kumar Kandakurti, and Ramprasad Mathukrishnan. "Comparative analysis of the effects of real-time audio-visual feedback, yoga and pressure biofeedback stabilizer in core strengthening: a randomised controlled trial." Biomedical Human Kinetics 17, no. 1 (2025): 135–46. https://doi.org/10.2478/bhk-2025-0013.

Full text
Abstract:
Abstract Study aim: To compare the efficiency of a pressure biofeedback stabilizer (PBS), Riablo audio-visual feedback (RAV), and yoga in core strengthening exercise protocols in overweight individuals with trunk instability. Materials and methods: The randomized controlled trial included 144 overweight individuals with trunk stability ≤ 42.3% (72 male, 72 female), age 27±5 years and BMI 27.1±1.1. They were equally divided into three experimental groups (PBS, RAV, and Yoga) and one control group. A pre-test was conducted for trunk instability using the modified double straight leg lowering test followed by 6 weeks of core strengthening exercise protocols. A post-test was conducted four times after commencing the exercise protocols at the end of the first, second, third and sixth week. Results: The RAV group exhibited significant improvement from the first week (β= 1.5, SE = 0.33, p= 0.02) to the sixth week (β= 20.2, SE = 0.329, p< 0.001) in trunk stability. Although the first week result was negligible for the Yoga group, it showed improvement from the second week and reached a maximum at the sixth week (β= 13.9, SE = 0.329, p < 0.001). The PBS group showed slow but consistent improvement, noted from the third week and reaching a peak in the sixth week (β = 6.9, SE = 0.329, p < 0.001), while the control group exhibited no progress in trunk stability. Conclusions: The RAV training protocol improved core stability in overweight subjects faster than yoga and PBS protocols. All three training protocols improved core stability and balance compared to the control group, and exhibited a time-dependent association. To attain trunk stability faster and more efficiently, we suggest implementing the RAV core strengthening protocol.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Strengthening protocol"

1

Robinson, Elena Ann Robinson. "The use of kinesio tape, with a strengthening protocol, in aiding scapular retraction through facilitation of the rhomboids." Marietta College Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=marhonors1524836295349199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hlabangana, Verna Ntombikayise. "Will the SADC Protocol on Trade in Services be effective in meeting its objectives of strengthening the region's services market?" Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/64610.

Full text
Abstract:
The SADC Protocol on Trade in Services seeks to create a strengthened single integrated services market in the region. Such a Protocol could be of great benefit to SADC as the region’s services sectors are not efficient nor are they competitive. The region’s services sector is also characterised by comparatively high costs. The liberalisation of trade in services is seen as a way in which countries can create competitive and efficient services sectors, while boosting FDI and GDP. While the will to negotiate on the liberalisation of services is significant, it is equally important that the framework utilised for such liberalisation be well thought through and structured. An agreement that is not well thought through or does not put in place all the rules and mechanisms necessary for the efficient liberalisation of trade in services could have the result frustrate the liberalisation process. It is not sufficient to commit to the liberalisation of services, members to preferential trade agreements for the liberalisation of services must commit to negotiate on other measures that have a direct impact on the implementation of such agreements. This paper will analyse whether or not the SADC Protocol on Trade in Services in its current form will be successful in creating an integrated services market in the region.<br>Mini Dissertation (LLM)--University of Pretoria, 2017.<br>Centre for Human Rights<br>LLM<br>Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
3

Suriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.

Full text
Abstract:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Buchmann, Nicolas [Verfasser]. "Strengthening trust in the identity life cycle : Enhancing electronic machine readable travel documents due to advances in security protocols and infrastructure / Nicolas Buchmann." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1180387961/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"The effect of the chiropractic adjustment with a strengthening protocol compared to chiropractic adjustment or a strengthening protocol alone." Thesis, 2009. http://hdl.handle.net/10210/2999.

Full text
Abstract:
M.Tech.<br>OBJECTIVE: The aim of this study was to determine whether adjustment of the cervico-thoracic motion segment in individuals with altered or decreased motion at that segment, in conjunction with a strengthening protocol, had a greater increase in triceps brachii muscle strength compared to a strengthening protocol or chiropractic adjustment alone. By reducing the negative neural and other effects caused by aberrant movement between vertebra, chiropractic adjustment could allow the body’s muscle physiology to function at its best, thereby allowing it to adapt to changes more readily. DESIGN: Thirty subjects participated in this study. The subjects were randomly and without being aware of it, assigned to one of three groups. The only requirement for inclusion in the research was a restriction of the seventh cervical vertebra based on motion and static palpation. Patients in two of the groups were asked to perform tricep brachii muscle strengthening exercises and patients from two of the groups received chiropractic adjustment to the cervico-thoracic motion segment. Patients were seen a total of three times over a period of two weeks. MEASUREMENTS: Triceps brachii muscle strength testing was performed using an isometric dynamometer. Three pre-treatment readings and three post-treatment readings were performed, with one-minute intervals, on all the subjects. This was done to determine if there was a change before or after treatment and if there was a long-term effect. CONCLUSION: Although measurements were taken on each visit before and after each treatment, there was only a statistically significant difference in triceps brachii muscle strength between the experimental and the other two groups before treatment on the third visit. This does however; suggest that there was a favourable result and that a combination of treatments does indeed produce better results than one of the other treatments alone.
APA, Harvard, Vancouver, ISO, and other styles
6

Pearson, Graham S., Malcolm R. Dando, and N. A. Sims. "The Composite Protocol Text: An Effective Strengthening of the Biological and Toxin Weapons Convention." 2001. http://hdl.handle.net/10454/839.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Strengthening protocol"

1

Europe, Council of. Second Additional Protocol to the Convention on Cybercrime Concerning the Strengthening of Cooperation and the Disclosure of Electronic Evidence: Strasbourg, 12. 5. 2022. Council of Europe, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Broussal-Derval, Aurélien. Training and Conditioning for Judo. Human Kinetics, 2019. http://dx.doi.org/10.5040/9781718225732.

Full text
Abstract:
“Whether you’re training for judo, mixed martial arts, or wrestling, the diverse programming options in Training and Conditioning for Judo will help you meet the constantly changing demands of your physical, mental, and technical training.” —Colton Brown, U.S. Judo Athlete and Olympian “Aurélien’s strength and conditioning methodology was so specific that it helped me transfer my power from the gym to the mat.” —Gemma Gibbons, Silver Medal Winner at the 2012 Olympics “Training and Conditioning for Judo goes beyond training and straight to the heart of winning. It will train, prepare, and inspire you to excel. Truly a must-have.” —Alex Turner, U.S. Judo Athlete and Olympian Long one of the world’s most popular sports, judo is also one of the most physically demanding. Success requires hard work, dedication, support, and a no-nonsense, comprehensive training program—one specific to the sport as well as the individual attributes of the athletes who compete in it. Enter Training and Conditioning for Judo. A blend of science and tradition, Training and Conditioning for Judo delivers comprehensive, yet practical, programming for serious judokas and their senseis, instructors, and trainers. This integrated approach merges strength, speed, agility, and endurance training with judo-specific drills and activities, ensuring total preparation for combat, competition, and all-around excellence. With diverse programming options that will help you avoid performance plateaus, you’ll find training methodologies to incorporate into daily workouts: Muscle strengthening exercises for balance control, increased power, and improved kumikataEndurance training through running, power and lactic circuits, and uchi-komi to improve overall conditioningPlanning strategies for recovery cycles and tapering to time peak performance with competitionsRecovery and prevention protocols to keep the body resilient and to avoid injury You’ll use bodyweight, machines, medicine and stability balls, ropes, bands, and straps to keep training options fresh. Whether you’re a young or senior judoka, male or female, lightweight or heavyweight, you will develop the physical abilities needed to take down your opponent with force and confidence. With a black belt in both judo and Brazilian jujitsu and experience that includes training the British and Russian Olympic judo teams, Aurélien Broussal-Derval is uniquely qualified to help judokas—from beginners to competitive black belts—develop the balance, coordination, and power needed for success on the mat.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Strengthening protocol"

1

Zawadzki, Piotr. "Ping-Pong Protocol Strengthening against Pavičić’s Attack." In Computer Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stolk, Elly, Juan Manuel Ramos-Goñi, Kristina Ludwig, Mark Oppe, and Richard Norman. "The Development and Strengthening of Methods for Valuing EQ-5D-5L – An Overview." In Value Sets for EQ-5D-5L. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89289-0_2.

Full text
Abstract:
AbstractThe introduction of the EQ-5D-5L offered an opportunity to develop a standardised valuation protocol, the EQ-VT protocol, with improved methods for health state valuation that enables comparison of the resulting value sets between countries. This chapter summarises the process of developing and strengthening the methods for valuing EQ-5D-5L in the EQ-VT protocol which underpins the valuation studies reported in this book. This includes an overview of the methodological research programme that informed the initial EQ-VT protocol and a description of the key elements of the protocol and the included valuation techniques, i.e. composite time trade-off and discrete choice experiments. This chapter also discusses the first wave of EQ-5D-5L valuation studies which used the protocol and the resulting conclusions; the subsequent modification and strengthening of the EQ-VT protocol including a quality control procedure; and experience with use of the improved EQ-VT protocol in the subsequent waves of EQ-5D-5L valuation studies. The chapter concludes with an overview of the lessons learned during this journey of evidence-based refinement of the EQ-VT protocol from version 1.0 to the current version 2.1.
APA, Harvard, Vancouver, ISO, and other styles
3

Shrikrishna, Khedkar, N. V. Narendra Kumar, and R. K. Shyamasundar. "Security Analysis of EMV Protocol and Approaches for Strengthening It." In Distributed Computing and Internet Technology. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72344-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garba, Faisal, and Thomas Yeboah. "Free Movement and Regional Integration in the ECOWAS Sub-Region." In IMISCOE Research Series. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97322-3_2.

Full text
Abstract:
AbstractThis chapter situates attempts at promoting free movement of persons and regional integration in West Africa in a historical perspective. Employing a combination of historical policy research, critical literature review, and an analysis of secondary data, the chapter provides a chronology of the development of the Economic Community of West African States’ (ECOWAS) Protocol on Free Movement. This is done within the context of how the implementation of the Protocol facilitate human mobility and regional integration. The chapter pays attention to how the provision of the Protocol enables citizens of the West African region to take advantage of the opportunities in member states, and further explores some of the major challenges in the implementation of the Protocol. The chapter shows that the protocol on free movement allows ECOWAS citizens to continue to travel without visas within the region. Free movement of persons in the region has yielded great economic benefits in terms of boosting intra-regional trade, supporting the livelihoods of Community citizens and increasing remittance flows within the region. Nevertheless, there are still challenges associated with extortion and harassment of migrants at border crossings, and a lack of coherence between the member state national laws and the ECOWAS Protocols has meant that protocol is yet to be fully realised. The chapter also presents analysis of the prospects of recent attempts at strengthening the protocol such as the proposal to lift the provision/restriction that allows/limits member states’ citizens to enter and stay for maximum of 90 days and the proposal for the establishment of a common social security across the region.
APA, Harvard, Vancouver, ISO, and other styles
5

Rattal, Salma, Isabelle Lajoie, Omar Sefraoui, Kamal Ghoumid, Réda Yahiaoui, and El Miloud Ar-Reyouchi. "A Resilient and Efficient Protocol for Strengthening the Internet of Things Network Performance." In IoT Based Control Networks and Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5845-8_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garay, Juan A., Philip MacKenzie, and Ke Yang. "Strengthening Zero-Knowledge Protocols Using Signatures." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-39200-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mao, Wenbo, and Colin Boyd. "On strengthening authentication protocols to foil cryptanalysis." In Computer Security — ESORICS 94. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58618-0_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Peng, Yongdae Kim, Vishal Kher, and Taekyoung Kwon. "Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tapiola, Kari. "What Happened to International Labour Standards and Human Rights at Work?" In International Labour Organization and Global Social Governance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55400-2_3.

Full text
Abstract:
Abstract The social rules of a universal market economy, created by globalization, are based on the standards adopted by the ILO since 1919. Among them a special role belongs to fundamental principles and rights at work, comprised in an ILO Declaration in 1998. They provide for freedom of association, collective bargaining and the elimination of child and forced labour and discrimination. There is a growing debate on how other standards should be linked to fundamental rights and not seen as less important instruments. Technical cooperation has demonstrated that, in any case, implementing fundamental rights leads to strengthening of law and practice on wages, social security and occupational safety and health. All international labour standards (Conventions, Recommendations and Protocols) are derived from the labour principles of the ILO Constitution, and they are closely connected with one another. While the role of the state remains crucial—especially in times of crisis—much of the implementation of labour standards should be achieved through collective bargaining and other negotiations, while voluntary agreements between the social partners are generally legally binding.
APA, Harvard, Vancouver, ISO, and other styles
10

Papadakis, Athanasios, Antonios Lalas, Sofia Petridou, Konstantinos Votis, and Dimitrios Tzovaras. "Technical Cybersecurity Implementation on Automated Minibuses with Security Information and Event Management (SIEM)." In Contributions to Management Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61681-5_7.

Full text
Abstract:
AbstractThis chapter examines the integration of security information and event management (SIEM) systems into the cybersecurity infrastructure of automated minibuses to emphasize their critical importance in today’s urban mobility ecosystems. As automated minibuses become an integral part of smart city initiatives, ensuring their cybersecurity is critical in the context of increasingly sophisticated cyber threats. SIEM systems are becoming indispensable tools for detecting, responding to, and mitigating such threats through real-time monitoring, data collection, and analysis from multiple sources. This chapter examines various open-source SIEM solutions, their operational benefits, and the challenges associated with implementing these cybersecurity measures in automated mobility. It addresses the critical need for advanced security protocols, customization to meet specific operational requirements, and the balance between comprehensive cybersecurity coverage and resource constraints. Through an analysis of common SIEM platforms and their application to protect automated minibuses from cyber threats, the chapter highlights the critical role of SIEM in strengthening the cybersecurity defences of automated mobility ecosystems, ensuring passenger safety, and maintaining the integrity of smart urban transport networks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Strengthening protocol"

1

Hariharasudhan, S., Vineetha Varghese, K. Malarvizhi, S. P. Santhoshkumar, T. Nalini, and D. Vikram. "Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raghavendran, Prabakaran, Tharmalingam Gunasekar, and Saikat Gochhait. "Strengthening Cryptographic Protocols: Leveraging the Soham Transform’s Unique Capabilities." In 2024 5th International Conference on Data Analytics for Business and Industry (ICDABI). IEEE, 2024. https://doi.org/10.1109/icdabi63787.2024.10800575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumara, Bharath, Pareshwar Prasad Barmola, Renuka Arora, Swapnil M. Parikh, and Ramya Maranan. "AI-Enhanced Virtual Twin Modelling for Strengthening IoT Software Security Protocols." In 2024 First International Conference on Software, Systems and Information Technology (SSITCON). IEEE, 2024. https://doi.org/10.1109/ssitcon62437.2024.10796126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moradi, Fereidoun, Hamid Mala, and Behrouz Tork Ladani. "Cryptanalysis and strengthening of SRP+ protocol." In 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC). IEEE, 2015. http://dx.doi.org/10.1109/iscisc.2015.7387904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Buccafurri, Francesco, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia Labrini. "WIP: An Onion-Based Routing Protocol Strengthening Anonymity." In 2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2021. http://dx.doi.org/10.1109/wowmom51794.2021.00041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sjoholmsierchio, Michael, Britta Hale, Daniel Lukaszewski, and Geoffrey Xie. "Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks." In 2021 IEEE 7th International Conference on Network Softwarization (NetSoft). IEEE, 2021. http://dx.doi.org/10.1109/netsoft51509.2021.9492614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tunnicliffe, Martin J., Omego Obinna, and Eckhard Pflucgel. "Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces." In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Arzaki, Muhammad. "Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack." In 2018 6th International Conference on Information and Communication Technology (ICoICT). IEEE, 2018. http://dx.doi.org/10.1109/icoict.2018.8528731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Rajesh, Nilesh Kumar Jadav, Sudeep Tanwar, and Anand Nayyar. "Blockchain and AI-assisted Onion Routing Protocol for Strengthening Anonymity in Beyond 5G IoMVs Networks." In ICIIT 2023: 2023 8th International Conference on Intelligent Information Technology. ACM, 2023. http://dx.doi.org/10.1145/3591569.3591582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nugroho, Herjuno Ari, Dian Fitria Agustiyanti, Marissa Angelina, Ratih Asmana Ningrum, Silmi Rahmani, and Popi Hadi Wisnuwardhani. "Biosafety protocol verification to inactivate Indonesian isolate SARS CoV-2 using formaldehyde." In PROCEEDINGS OF THE 9TH INTERNATIONAL SYMPOSIUM ON INNOVATIVE BIOPRODUCTION INDONESIA ON BIOTECHNOLOGY AND BIOENGINEERING 2022: Strengthening Bioeconomy through Applied Biotechnology, Bioengineering, and Biodiversity. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0183716.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Strengthening protocol"

1

Chen, Botao, Xiaohong Fan, Tong Li, et al. Spine strengthening exercise for treating aged hyperkyphosis: a protocol of systematic review and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2020. http://dx.doi.org/10.37766/inplasy2020.12.0091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bozek, Michael, and Tani Hubbard. Greater Yellowstone Network amphibian monitoring protocol science review: A summary of reviewers’ responses. National Park Service, 2022. http://dx.doi.org/10.36967/nrr-2293614.

Full text
Abstract:
Science reviews are an essential cornerstone of all excellent science programs and are a requirement of monitoring programs within the Inventory and Monitoring Division of the National Park Service (NPS). Science reviews provide necessary professional critique of objectives, study design, data collection, analysis, scientific interpretation, and how effectively information is transferred to target audiences. Additionally, reviews can help identify opportunities to cooperate more effectively with interested and vested partners to expand the impacts of collective findings across larger landscapes. In December 2020, seven biologists from USGS, USFWS, and NPS provided a critical review of the Greater Yellowstone Network Amphibian Monitoring Protocol for monitoring Columbia spotted frogs (Rana luteiventris), boreal chorus frogs (Pseudacris maculata), western toads (Anaxyrus boreas), western tiger salamanders (Ambystoma mavortium), and environmental conditions at wetland sites clustered within watershed units in Yellowstone and Grand Teton national parks. This review followed sixteen years of GRYN amphibian and wetland monitoring, allowing us to evaluate the impact of the work thus far and to discuss potential improvements to the protocol. Reviewers were asked to assess the following amphibian monitoring objectives per Bennetts et al. (2013, Cooperative amphibian monitoring protocol for the Greater Yellowstone Network: Narrative, version 1.0, https://irma.nps.gov/DataStore/Reference/Profile/2194571) and to assess the degree to which GRYN is meeting the objectives based on the current sampling, analyses, and reporting: Objective 1: Estimate the proportion of catchments and wetland sites used for breeding by each of the four common, native amphibian species annually, and estimate the rate at which their use is changing over time. Objective 2: Determine the total number of wetlands within sampled catchments that are suitable for amphibian breeding (i.e., have standing water during the breeding season) annually. Objective 3: For western toads, estimate the proportion of previously identified breeding areas that are used annually, and estimate the rate at which their use may be changing over time. Generally, reviewers commended the GRYN Amphibian Monitoring Program, including the design, the statistical rigor of current analytical approaches, the large number of monitoring reports and publications, and the audiences reached. Reviewers unanimously felt that the first two objectives of this protocol are being met for two species (Columbia spotted frogs and boreal chorus frogs) in medium- and high-quality catchments, and all but one reviewer also felt these objectives are being met for western tiger salamanders. It was universally recognized that objective 3 for western toads is not being met but reviewers attributed this to issues related to funding and capacity rather than design flaws. Reviewers felt the current design provides an adequate base for parlaying additional work and offered suggestions focused on increasing efficiencies, maximizing information that can be collected in the field, strengthening analyses, and improving scientific outreach. In this document, we summarize reviewers' comments and include their full written reviews in Appendix B.
APA, Harvard, Vancouver, ISO, and other styles
3

Marto, Ricardo, Paola Buitrago, Agustina Schijman, et al. Country Program Evaluation: Jamaica 2009-2014. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0010600.

Full text
Abstract:
This document presents an evaluation by the Office of Evaluation and Oversight (OVE) of the Country Program of the Inter-American Development Bank (IDB, or the Bank) with Jamaica over the period 2009-2014. It is OVE's third independent assessment of the Bank's program in Jamaica. Past evaluations covered the periods 1990-2002 (RE-310, October 2005) and 2003-2008 (RE-365, June 2010).According to the Bank's Protocol for Country Program Evaluations (CPEs) (RE-348-3), the main function of a CPE is "to provide information on Bank performance at the country level that is credible and useful, and that enables the incorporation of lessons and recommendations that can be used to improve the development effectiveness of the Bank's overall strategy and program of country assistance." Like other CPEs, this evaluation examines Bank support to the country, with the dual purpose of strengthening accountability and facilitating learning. The assessment in the CPE covers a portfolio that includes all the operations approved between 2009 and July 2014, together with those approved previously but implemented during this period. The details of the portfolio are provided in the annexes to this document. In preparing this document, OVE interviewed some 130 people, including the Bank's main counterparts among the Jamaican authorities, project execution units, members of civil society and the private sector, representatives of multilateral agencies with presence in Jamaica, the Bank's General Manager for the Caribbean Region Department, the Bank's current and former Representatives in Jamaica, and IDB staff at the Bank's Country Office and at Headquarters. The mission also visited the sites of IDB-supported projects to assess implementation progress and challenges.
APA, Harvard, Vancouver, ISO, and other styles
4

Hrynick, Tabitha, Santiago Ripoll, and Janine Shaw. Strengthening Community and Community Engagement Infrastructure for Better Pandemic and Emergency Preparedness at the Local Level. Institute of Development Studies, 2025. https://doi.org/10.19088/ids.2025.005.

Full text
Abstract:
This evidence brief draws on anthropological research in Ealing, a borough in Northwest London, to demonstrate how investing in community engagement infrastructure is fundamental to pandemic preparedness. While traditional preparedness often focuses on plans and protocols, the Ealing experience shows that the ability to rapidly mobilise trusted community relationships may be more critical for effective emergency response. Such relationships enable both broad public cooperation with emergency measures and targeted support for diverse groups, including those who are often marginalised or harder to reach through conventional one-size-fits-all approaches. This brief provides insights and key considerations for local authorities and health system actors with regard to strengthening these essential foundations. Its findings are particularly applicable to other superdiverse urban contexts, but key messages will also resonate in other local settings across the UK.
APA, Harvard, Vancouver, ISO, and other styles
5

Eparkhina, Dina. EuroSea Legacy Report. EuroSea, 2023. http://dx.doi.org/10.3289/eurosea_d8.12.

Full text
Abstract:
EuroSea is a holistic large-scale project encompassing the full value chain of marine knowledge, from observations to modelling and forecasting and to user-focused services. This report summarizes the legacy of EuroSea as planned and measured through a dedicated impact monitoring protocol, a holistic assessment of the project's successes in advancing and integrating European ocean observing and forecasting systems. Since its start, EuroSea has been analysing how well the project progresses towards the identified areas of impact. Impact assessment is not performance evaluation. These terms overlap but are distinct: performance relates to the efficient use of resources; impact relates to the transformative effect on the users. The EuroSea legacy report is presented through an aggregation and analysis of the EuroSea work towards achieving its impacts. Overall, over 100 impacts have been identified and presented on the website and in a stand-alone impact report. The legacy report sheds light on 32 most powerful impacts (four impacts in each of the eight EuroSea impact areas). EuroSea Impact Areas: 1. Strengthen the European Ocean Observing System (EOOS), support the Global Ocean Observing System (GOOS) and the GOOS Regional Alliances; 2. Increase ocean data sharing and integration; 3. Deliver improved climate change predictions; 4. Build capacity, internally in EuroSea and externally with EuroSea users, in a range of key areas; 5. Develop innovations, including exploitation of novel ideas or concepts; shorten the time span between research and innovation and foster economic value in the blue economy; 6. Facilitate methodologies, best practices, and knowledge transfer in ocean observing and forecasting; 7. Contribute to policy making in research, innovation, and technology; 8. Raise awareness of the need for a fit for purpose, sustained, observing and forecasting system in Europe. Ocean observing and forecasting is a complex activity brining about a variety of technologies, human expertise, in water and remote sensing measurements, high-volume computing and artificial intelligence, and a high degree of governance and coordination. Determining an impact on a user type or an area, therefore, requires a holistic assessment and a clear strategic overview. The EuroSea impact monitoring protocol has been the first known such attempt in a European ocean observing and forecasting project. The project’s progress has been followed according to the identified impact areas, through consortium workshops, stakeholder webinars, tracking, and reporting. At the end of EuroSea, we are able to demonstrate how well we have responded to the European policy drivers set out in the funding call and the grant agreement of our project, signed between the European Commission and 53 organizations, members of the EuroSea consortium. The project's impact is diverse, spanning areas from strengthening ocean observing governance to contributing to policymaking or boosting ocean research, innovation, and technology. Each impact area underscores EuroSea's commitment to a sustainable and informed approach to ocean observing and forecasting for enhanced marine knowledge and science-based sustainable blue economy and policies. (EuroSea Deliverable, D8.12)
APA, Harvard, Vancouver, ISO, and other styles
6

Poverenov, Elena, Tara McHugh, and Victor Rodov. Waste to Worth: Active antimicrobial and health-beneficial food coating from byproducts of mushroom industry. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7600015.bard.

Full text
Abstract:
Background. In this proposal we suggest developing a common solution for three seemingly unrelated acute problems: (1) improving sustainability of fast-growing mushroom industry producing worldwide millions of tons of underutilized leftovers; (2) alleviating the epidemic of vitamin D deficiency adversely affecting the public health in both countries and in other regions; (3) reducing spoilage of perishable fruit and vegetable products leading to food wastage. Based on our previous experience we propose utilizing appropriately processed mushroom byproducts as a source of two valuable bioactive materials: antimicrobial and wholesome polysaccharide chitosan and health-strengthening nutrient ergocalciferol⁽ᵛⁱᵗᵃᵐⁱⁿ ᴰ2⁾. ᴬᵈᵈⁱᵗⁱᵒⁿᵃˡ ᵇᵉⁿᵉᶠⁱᵗ ᵒᶠ ᵗʰᵉˢᵉ ᵐᵃᵗᵉʳⁱᵃˡˢ ⁱˢ ᵗʰᵉⁱʳ ᵒʳⁱᵍⁱⁿ ᶠʳᵒᵐ ⁿᵒⁿ⁻ᵃⁿⁱᵐᵃˡ ᶠᵒᵒᵈ⁻ᵍʳᵃᵈᵉ source. We proposed using chitosan and vitamin D as ingredients in active edible coatings on two model foods: highly perishable fresh-cut melon and less perishable health bars. Objectives and work program. The general aim of the project is improving storability, safety and health value of foods by developing and applying a novel active edible coating based on utilization of mushroom industry leftovers. The work plan includes the following tasks: (a) optimizing the UV-B treatment of mushroom leftover stalks to enrich them with vitamin D without compromising chitosan quality - Done; (b) developing effective extraction procedures to yield chitosan and vitamin D from the stalks - Done; (c) utilizing LbL approach to prepare fungal chitosan-based edible coatings with optimal properties - Done; (d) enrichment of the coating matrix with fungal vitamin D utilizing molecular encapsulation and nano-encapsulation approaches - Done, it was found that no encapsulation methods are needed to enrich chitosan matrix with vitamin D; (e) testing the performance of the coating for controlling spoilage of fresh cut melons - Done; (f) testing the performance of the coating for nutritional enhancement and quality preservation of heath bars - Done. Achievements. In this study numerous results were achieved. Mushroom waste, leftover stalks, was treated ʷⁱᵗʰ ᵁⱽ⁻ᴮ ˡⁱᵍʰᵗ ᵃⁿᵈ ᵗʳᵉᵃᵗᵐᵉⁿᵗ ⁱⁿᵈᵘᶜᵉˢ ᵃ ᵛᵉʳʸ ʰⁱᵍʰ ᵃᶜᶜᵘᵐᵘˡᵃᵗⁱᵒⁿ ᵒᶠ ᵛⁱᵗᵃᵐⁱⁿ ᴰ2, ᶠᵃʳ ᵉˣᶜᵉᵉᵈⁱⁿᵍ any other dietary vitamin D source. The straightforward vitamin D extraction procedure and ᵃ ˢⁱᵐᵖˡⁱᶠⁱᵉᵈ ᵃⁿᵃˡʸᵗⁱᶜᵃˡ ᵖʳᵒᵗᵒᶜᵒˡ ᶠᵒʳ ᵗⁱᵐᵉ⁻ᵉᶠᶠⁱᶜⁱᵉⁿᵗ ᵈᵉᵗᵉʳᵐⁱⁿᵃᵗⁱᵒⁿ ᵒᶠ ᵗʰᵉ ᵛⁱᵗᵃᵐⁱⁿ ᴰ2 ᶜᵒⁿᵗᵉⁿᵗ suitable for routine product quality control were developed. Concerning the fungal chitosan extraction, new freeze-thawing protocol was developed, tested on three different mushroom sources and compared to the classic protocol. The new protocol resulted in up to 2-fold increase in the obtained chitosan yield, up to 3-fold increase in its deacetylation degree, high whitening index and good antimicrobial activity. The fungal chitosan films enriched with Vitamin D were prepared and compared to the films based on animal origin chitosan demonstrating similar density, porosity and water vapor permeability. Layer-by-layer chitosan-alginate electrostatic deposition was used to coat fruit bars. The coatings helped to preserve the quality and increase the shelf-life of fruit bars, delaying degradation of ascorbic acid and antioxidant capacity loss as well as reducing bar softening. Microbiological analyses also showed a delay in yeast and fungal growth when compared with single layer coatings of fungal or animal chitosan or alginate. Edible coatings were also applied on fresh-cut melons and provided significant improvement of physiological quality (firmness, weight ˡᵒˢˢ⁾, ᵐⁱᶜʳᵒᵇⁱᵃˡ ˢᵃᶠᵉᵗʸ ⁽ᵇᵃᶜᵗᵉʳⁱᵃ, ᵐᵒˡᵈ, ʸᵉᵃˢᵗ⁾, ⁿᵒʳᵐᵃˡ ʳᵉˢᵖⁱʳᵃᵗⁱᵒⁿ ᵖʳᵒᶜᵉˢˢ ⁽Cᴼ2, ᴼ²⁾ ᵃⁿᵈ ᵈⁱᵈ not cause off-flavor (EtOH). It was also found that the performance of edible coating from fungal stalk leftovers does not concede to the chitosan coatings sourced from animal or good quality mushrooms. Implications. The proposal helped attaining triple benefit: valorization of mushroom industry byproducts; improving public health by fortification of food products with vitamin D from natural non-animal source; and reducing food wastage by using shelf- life-extending antimicrobial edible coatings. New observations with scientific impact were found. The program resulted in 5 research papers. Several effective and straightforward procedures that can be adopted by mushroom growers and food industries were developed. BARD Report - Project 4784
APA, Harvard, Vancouver, ISO, and other styles
7

Soldano, Miguel, Michelle Fryer, Ana María Linares, et al. Country Program Evaluation: Panama (2010-2014). Inter-American Development Bank, 2015. http://dx.doi.org/10.18235/0010618.

Full text
Abstract:
This Country Program Evaluation (CPE) is the third independent evaluation of the country program of the Inter-American Development Bank (the Bank) with Panama. Past evaluations covered the periods 1991-2003 (RE-305), when the country was transitioning to full control of its prime economic asset, the Panama Canal, and the Canal Zone territory and infrastructure, and 2005-2009 (RE-359), a period characterized by extraordinarily good macroeconomic performance and significant fiscal reform. This CPE spans January 2010 to December 2014, years marked by an ambitious public investment program and a strong reduction in unemployment and poverty, although accompanied by income inequality.According to the Bank's Protocol for Country Program Evaluations (RE-348-3), the main goal of a CPE is to provide information on Bank performance at the country level that is credible and useful, and that enables the incorporation of lessons and recommendations that can be used to improve the development effectiveness of the Bank's overall strategy and program of country assistance. Like other CPEs, this evaluation seeks to examine the Bank's relationship with the country from an independent perspective, strengthening accountability and facilitating learning to serve as an input to the new Country Strategy under preparation for 2015-2019. To prepare this document, OVE interviewed the Bank's main counterparts among Panama's authorities, project execution units, civil society and the private sector, multilateral agencies with presence in Panama, and Bank staff in Panama and at Headquarters. OVE also visited Bank-supported projects to assess implementation progress and challenges. The evaluation portfolio includes all operations approved over the review period, together with those approved previously but implemented during the review period. Chapter 1 examines Panamas economic and social development over 2010-2014 and considers the countrys medium-term prospects. Chapter 2 analyzes the strategic and financial relevance of the Bank's program and assesses implementation effectiveness. Chapter 3 discusses the results achieved in the six strategic sectors identified by the 2010-2014 Country Strategy and assesses the use of country systems. Chapter 4 presents concluding remarks and recommendations. The annexes provide details of the portfolio and include figures that support OVE's analysis.
APA, Harvard, Vancouver, ISO, and other styles
8

Yeika, Eugene, Erica L. Kocher, and Carrie Ngongo. Integrating Noncommunicable Diseases into Antenatal Care in Cameroon: A Triangulated Qualitative Analysis. RTI Press, 2024. http://dx.doi.org/10.3768/rtipress.2024.rr.0051.2401.

Full text
Abstract:
Noncommunicable diseases (NCDs) have important implications for pregnancy outcomes and the subsequent health of women and their children. The aim of this study is to determine the status of NCD and maternal health program integration, identify barriers to integration, and explore what would be required to deepen integration of NCD care into antenatal care in Cameroon. We used two methods of data collection and synthesis: a desk review of policy documents and protocols and a series of key informant interviews with health system experts and managers working in public, private, and faith-based health facilities at central, regional, and district levels. Although screening for blood glucose and blood pressure occurs during antenatal care, post-diagnosis management is not well-integrated and often requires referral to specialists in higher-level health facilities. Key barriers to integration include lack of guidelines for the management of NCDs, financial constraints for facilities and patients, and shortages of health workers, medications, and supplies for laboratory investigations. Further integration of services for NCDs during pregnancy will require national guidelines backed up by system-wide strengthening of health information systems, insurance coverage, supply chain management, and human resource capacity, particularly in remote areas.
APA, Harvard, Vancouver, ISO, and other styles
9

Melad, Kris Ann. Harmonizing Philippine Census Data across Decades (1970–2020). Philippine Institute for Development Studies, 2024. https://doi.org/10.62986/dp2024.44.

Full text
Abstract:
This research harmonizes Philippine Census of Population and Housing (CPH) data from 1970 to 2020 to address data consistency challenges across five decades. The study systematically reconciles evolving variable definitions, classification systems, and measurement scales to create a unified longitudinal dataset. Key harmonization challenges include accommodating changes in the education system, such as the K-12 reforms, tracking modifications to administrative boundaries over the years, managing the expanding data scope across census years, and addressing historical data preservation issues, particularly for the 1970 and 1980 censuses. The research involved the creation of translation tables and crosswalks for major classification systems, including the Philippine Standard Geographic Classification (PSGC), Philippine Standard Occupational Classification (PSOC), and Philippine Standard Industrial Classification (PSIC). Variable-specific harmonization protocols and guidelines for researchers using the harmonized data are also documented. The harmonization process standardized core demographic variables across all periods while preserving more detailed classifications where possible, though some variables necessarily lost granularity when harmonized to their lowest common denominator. Beyond producing a consistent dataset for longitudinal analysis, this study contributes to PIDS's agenda of strengthening statistical systems for evidence-based policymaking. The paper concludes with recommendations for improving future census data collection and harmonization practices to support effective policy development in the Philippines.
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Jeehee, Rodrigo Salgado, Monica Prezzi, Yao Wang, and Fei Han. Development of Protocols for Reuse Assessment of Existing Foundations in Bridge Rehabilitation and Replacement Projects. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317654.

Full text
Abstract:
The existing foundations of a bridge can sometimes be reused. This may occur when a completely new bridge is built but also in bridge or superstructure widening projects. Reuse of existing foundations not only eliminates the costs associated with demolishing and disposing of old foundations, but also reduces the costs of the design and construction of new foundation elements. However, several challenges exist, including assessing the structural integrity, estimating the current capacity, estimating the remaining service life, and considering current design codes and specifications of the existing foundations, and clear guidelines for foundation reuse. The absence of foundation reuse guidelines by INDOT hinders the reuse of bridge foundations and prevents design consultants from designing new structures using existing foundations. In this project, comprehensive foundation reuse guidelines were developed in the form of flow charts based on a literature review on bridge foundation reuse design—including technical publications and existing standards and codes—and a set of analyses. The proposed guidelines include detailed guidance on inspection of the structural integrity of existing foundations, determination of as-built geometry of existing foundations, capacity estimation of existing foundations, minimum requirements for foundation reuse, and selection of foundation reuse solutions. The proposed guidelines for foundation reuse design were tested in an ongoing INDOT project. From the implementation project, we found that a complete site investigation that produces reliable estimation of soil profile and properties, is essential to determine whether there is reserve capacity in existing foundations. Additional site investigation is generally worth doing, not only to account for any strengthening of the soil that may have occurred over time, but also because of the greater accuracy in interpretation and analysis that results. We also found that use of the most current, cutting-edge methods can be useful in estimating the reserve capacity of existing foundations, and that design checks using different design codes can produce contrasting results.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography