Academic literature on the topic 'TTH protocolo'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'TTH protocolo.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "TTH protocolo"

1

van Rhee, Frits, Jeffrey R. Sawyer, Saad Z. Usmani, Sarah Waheed, Christoph Heuck, Alan Mitchell, Antje Hoering, and Bart Barlogie. "Metaphase Cytogenetic Abnormality (CA) Subtypes in Multiple Myeloma (MM) Treated with Front Line Total Therapy (TT) Protocols TT1, TT2, TT3, TT4 and TT5." Blood 120, no. 21 (November 16, 2012): 193. http://dx.doi.org/10.1182/blood.v120.21.193.193.

Full text
Abstract:
Abstract Abstract 193 We have previously reported on the adverse prognostic implications of CA, independently contributing to clinical outcome prediction even in the era of gene expression profiling (GEP). The presence of hypodiploidy/deletion13 (CA13/hypo) was associated with a particular poor prognosis, whereas the absence of CA (no CA) imparted superior outcome; the remainder (other CA) had an intermediate prognosis. Here we provide an update of overall survival (OS) and progression-free survival (PFS) with TT1, TT2 control arm (TT2-), TT2 thalidomide arm (TT2+), TT3a, TT3b, TT4-light (TT4-L, fractionated melphalan + VTD), and TT4-standard (TT4-S). The backbone of protocols was tandem transplantation with melphalan 200mg/m2 (MEL-200). TT2 employed thalidomide during all phases of the protocol in a randomized fashion. TT3a introduced bortezomib and 3-yr maintenance with VTD for year 1 and TD for years 2 and 3; TT3b applied VRD with lenalidomide in all 3 years of maintenance; TT4-S used standard MEL-200 as conditioning, whilst in TT4 MEL-50 for 4 consecutive days was given. In addition, TT4L applied 1 instead of 2 cycles of induction and consolidation therapy. Both OS and PFS were consistently superior with “no CA” followed by “other CA” and “CA13/hypo” in all trials including TT4-S (Figure 1). However, there was a striking reversal of the benefit order with TT4-L: “no CA” fared worst, and both “CA13/hypo” and “other CA” had equally superior OS and PFS. The analyses were repeated for TT3 and TT4, limiting TT3 to the ∼85% of patients with GEP-defined low-risk MM, since TT4 was designed specifically for GEP70 low risk MM (Figure 2). In the “no CA” group, 2-yr OS and PFS were >90% in TT3a/b and TT4-S, compared to 75% in TT4-L (p=0.007 and 0.01 for TT3 and TT4-s, respectively). TT4-L patients had ∼90% 2-yr OS and PFS in case of “CA13/hypo” and “other CA”, contrasting with ∼60–80% 2-yr OS and PFS for the other protocols. It could be speculated that patients with “no CA” have more slowly cycling micro-environment dependent disease in which the well-recognized MEL dose response relationship is crucial. Conversely, the more genomically unstable “CA13/hypo”-type MM may benefit from the synergistic effect of repeated application of MEL and bortezomib, which could be related to the ability of bortezomib to disrupt protein metabolism required for repair of MEL-induced DNA damage. The basis for these finding is under investigation, but do support the need for further studies investigating novel conditioning regimens and their exact beneficiaries, which could further personalize myeloma care and may be related to bortezomib's presence in the fractionated melphalan transplant regimen in TT4-L. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
2

Waheed, Sarah, Monica Grazziutti, Alejandro Restrepo, Saad Z. Usmani, Frits van Rhee, Jameel Muzaffar, Al-Ola Abdallah, Bijay Nair, Antje Hoering, and Bart Barlogie. "Renal Function Impairment (creatinine>=2mg/dL) Limits Progress Noted with the Transition From Total Therapies TT1 to TT2 to TT3 Across Age Groups." Blood 120, no. 21 (November 16, 2012): 1962. http://dx.doi.org/10.1182/blood.v120.21.1962.1962.

Full text
Abstract:
Abstract Abstract 1962 Older age and higher serum creatinine levels have long been considered adverse features for overall survival (OS) and progression-free survival (PFS) in MM. Here we are reporting on these variables and their impact on clinical outcomes with the evolution of TT protocols. Among patients <55yr, median OS was 6.4yr with TT1 with 30% alive at 15yr and 12.2yr with TT2. KM curves for TT2 and TT3 were superimposable and medians have not been reached for TT3. (p<0.0001) (Figure 1). The proportions alive were 30% at 15yr in TT1, 60% at 10yr in TT2, and 80% at 5yr in TT3. Median PFS was 2.7yr with TT1, 6.0yr with TT2, and not reached with TT3; ∼10% remain event-free from 15 to 20 years in TT1, 40% at 10yr in TT2, and almost 60% at 5yr in TT3 (p<0.0001). For the middle age group 55–64yr, 15% are alive at 15yr in TT1, 40% at 10yr in TT2, and 75% at 5yr in TT3 (p=0.006). The corresponding PFS was ∼10% at 15yr with TT1, 25% at 10yr with TT2, and 70% at 5yr with TT3 (p<0.0001). For patients >64yr, median OS was 3.3yr with TT1, 6.5yr with TT2, and not reached with TT3 (p=0.01); 15% are alive at 10yr with TT1, 30% at 10yr with TT2, 70% at 5yr with TT3. PFS was 1.9yr with TT1, 3.8yr with TT2 and not reached with TT3; No patients remain at 16yr with TT1, 30% at 10yr with TT2, and 65% at 5yr with TT3. Within protocols, age effects on OS were most apparent in TT1; with TT2 those <55yr outperformed the 2 older age groups, and no significant age difference was apparent for TT3. As to renal function, creatinine >=2 mg/dL was significantly linked to inferior OS in all 3 trials, with medians of 3.6yr v 6.1yr in TT1, 4.1yr v 9.1yr in TT2, and ∼50% v 75% alive at 5yr in TT3 (p=0.008,p=0.001,p=0.002) (Figure 2). PFS was 2.5yr with TT1 regardless of renal function(p=0.36), 3yr v 4.9yr with TT2 (p=0.002), and ∼40% v 70% at 5yr with TT3 (p<0.0001). Thus, major advances in both OS (p<0.0001) and PFS (p<0.0001) were observed with the transition from TT1 to TT2 to TT3 among patients with creatinine <2 mg/dL, whereas results remained dismal for the more impaired renal function group (OS: p=0.22, PFS: p=0.42). Accounting for all possible interactions between TT trial, age, and creatinine, multivariate logistic regression to predict 4-yr OS and 4-yr PFS showed consistently improved OR for OS with TT3>TT2>TT1 regardless of age groups; 4-yr PFS also benefited from TT3>TT2>TT1, but this was most clearly seen in the 55–64yr age group. Significant interactions with creatinine were not observed but levels >=2mg/dL remained an independent dominant adverse variable (OS: OR=2.31, p<0.0001; PFS: OR=2.11, p<0.0001) (Table 1). In conclusion, treatment advances have been realized in patients with preserved renal function across age groups. The poor outcome in patients with creatinine >=2.0mg/dL may not only reflect host- but also MM-related issues. Delaying more toxic VTD-PACE induction until improvement in renal function with VTD for 1 or 2 cycles may improve clinical outcomes. Figure 1: Overall and Progression-Free Survival by Age and Protocol Figure 1:. Overall and Progression-Free Survival by Age and Protocol Figure 2: Overall and Progression-Free Survival by Creatinine and Protocol Figure 2:. Overall and Progression-Free Survival by Creatinine and Protocol Table 1. Multivariate Logistic Regression on Age, Creatinine and Protocol Stepwise selection was used to determine the best models for 4-year OS and PFS in TT1-3. All 2-way (i.e. TT by Age) and 3-way (i.e. TT by Age by Creatinine) interactions were considered for inclusion in the logistic models. The lack of any significant interactions with Creatinine may be due to the small number of patients enrolled to TT trials with Creatinine >= 2 mg/dL. Endpoint OR Comparison OR (95% CI) p-value 4-year OS TT2 v TT1 0.58 (0.42, 0.81) 0.0013 TT3 v TT2 0.77 (0.59, 1.01) 0.0623 Age 55–64 v Age < 55 1.77 (1.34, 2.34) <.0001 Age >= 65 v Age 55–64 1.25 (0.92, 1.71) 0.1596 Cr >= 2mg/dL 2.31 (1.57, 3.41) <.0001 4-year PFS TT2 v TT1 Age < 55 0.28 (0.18, 0.43) <.0001 TT3 v TT2 Age < 55 0.75 (0.49, 1.15) 0.1881 TT2 v TT1 Age 55–64 0.55 (0.31, 0.99) 0.0463 TT3 v TT2 Age 55–64 0.33 (0.22, 0.51) <.0001 TT2 v TT1 Age >= 65 0.63 (0.25, 1.64) 0.3459 TT3 v TT2 Age >= 65 0.59 (0.36, 0.97) 0.0385 Cr >= 2mg/dL 2.11 (1.41, 3.16) 0.0003 Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
3

DAVIS, CARISA R., LOREE C. HELLER, K. KEALY PEAK, DAVID L. WINGFIELD, CYNTHIA L. GOLDSTEIN-HART, DEAN W. BODAGER, ANDREW C. CANNONS, PHILIP T. AMUSO, and JACQUELINE CATTANI. "Real-Time PCR Detection of the Thermostable Direct Hemolysin and Thermolabile Hemolysin Genes in a Vibrio parahaemolyticus Cultured from Mussels and Mussel Homogenate Associated with a Foodborne Outbreak." Journal of Food Protection 67, no. 5 (May 1, 2004): 1005–8. http://dx.doi.org/10.4315/0362-028x-67.5.1005.

Full text
Abstract:
Molecular methods have become vital epidemiological tools in the detection and characterization of bacteria associated with a foodborne outbreak. We used both culture and real-time PCR to detect a Vibrio parahaemolyticus isolate associated with a foodborne outbreak. The outbreak occurred in July 2002 in Polk County, Florida, and originated at a Chinese buffet, with one person being hospitalized. The hospital isolated V. parahaemolyticus from the patient but destroyed the sample after diagnosis. From an onsite visit of the restaurant, food samples that possibly contributed to the outbreak were collected and sent to the Florida Department of Health, Tampa Branch Laboratory. Crab legs, crabsticks, and mussel samples were homogenized and incubated according to the Food and Drug Administration Bacteriological Analytical Manual culture protocol. Three sets of primers and a TaqMan probe were designed to target the tdh, trh, and tlh genes and used for real-time PCR. This study was successful in isolating V. parahaemolyticus from a mussel sample and detecting two of its genes (tdh and tlh) in food and pure culture by real-time PCR.
APA, Harvard, Vancouver, ISO, and other styles
4

Haessler, J., B. P. Nair, J. Sawyer, A. Hoering, J. D. Shaughnessy, and B. Barlogie. "Metaphase cytogenetic abnormalities (M-CA) in multiple myeloma (MM): Examining number of M-CA for survival in total therapy protocols (TT1, TT2, TT3)." Journal of Clinical Oncology 28, no. 15_suppl (May 20, 2010): 8123. http://dx.doi.org/10.1200/jco.2010.28.15_suppl.8123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Obermair, Andreas, Nigel R. Armfield, Nicholas Graves, Val Gebski, George B. Hanna, Mark G. Coleman, Anne Hughes, and Monika Janda. "How to train practising gynaecologists in total laparoscopic hysterectomy: protocol for the stepped-wedge IMAGINE trial." BMJ Open 9, no. 5 (May 2019): e027155. http://dx.doi.org/10.1136/bmjopen-2018-027155.

Full text
Abstract:
IntroductionHysterectomy is the most common major gynaecological procedure in women and minimally invasive approaches should be used wherever possible; total laparoscopic hysterectomy (TLH) is one such surgical approach which allows removal of the uterus entirely laparoscopically. However, lack of surgical training opportunities is impeding its increased adoption. This study will formally test a surgical outreach training model to equip surgeons with the skills to provide TLH as an alternative to total abdominal hysterectomy (TAH).Methods and analysisStepped wedge implementation trial of a surgical training programme for practising obstetrician gynaecologist specialists in four hospitals.Primary outcomesChange in the proportion of hysterectomies performed by TAH, measured between preintervention and postintervention; we aim to reduce TAH by at least 30% in 75% of the trainees.Secondary outcomes(1) Number of hospitals screened, eligible, agree to training and complete the training; (2) number of surgeons screened for eligibility, eligible, agree to training, who complete training and achieve proficiency; (3) proportion of trainees achieving proficiency in correct theatre setup, vascular exposure, mobilisation and surgery closure; change in proportion proficient over time; (4) adverse events (conversion from TLH to TAH, anaesthetic incident, intraoperative visceral injury, red cell transfusions, hospital stay >7 days, incidental finding of malignancy, unplanned readmission, admission to intensive care, return to theatre, postoperative pulmonary embolism or deep vein thrombosis, development of a fistula, vault haematoma, vaginal vault dehiscence or pelvic infection); (5) hospital length-of-stay; (6) cost-effectiveness and (7) trainee surgeon proficiency with TLH.Ethics and disseminationThe study has been approved by the Royal Brisbane and Women’s Hospital Human Research Ethics Committee and has received site-specific approval from all participating hospitals. Results will be submitted for publication in a peer-reviewed journal.Trial registration numberNCT03617354; Pre-results.
APA, Harvard, Vancouver, ISO, and other styles
6

Everson, Carol A., and Thaddeus S. Nowak. "Hypothalamic thyrotropin-releasing hormone mRNA responses to hypothyroxinemia induced by sleep deprivation." American Journal of Physiology-Endocrinology and Metabolism 283, no. 1 (July 1, 2002): E85—E93. http://dx.doi.org/10.1152/ajpendo.00558.2001.

Full text
Abstract:
Sleep deprivation in rats results in progressive declines in circulating concentrations of both total and free thyroxine (T4) and triiodothyronine (T3) without an expected increase in plasma thyroid-stimulating hormone (TSH). Administration of thyrotropin-releasing hormone (TRH) results in appropriate increases in plasma TSH, free T4, and free T3across experimental days, suggesting deficient endogenous TRH production and/or release. This study examined transcriptional responses related to TRH regulation following sleep deprivation. In situ hybridization was used to detect and quantitate expression of mRNAs encoding prepro-TRH and 5′-deiodinase type II (5′-DII) in brain sections of six rats sleep deprived for 16–21 days, when there was marked hypothyroxinemia, and in sections from animals yoked to the experimental protocol as well as from sham controls. TRH transcript levels in the paraventricular nucleus (PVN) were essentially unchanged at 15–16 days but increased to about threefold control levels in three of four rats sleep deprived for 20–21 days, a change comparable to that typically found in prolonged experimental hypothyroidism. There was no evidence for suppression of 5′-DII mRNA levels, which would be a sign of T3feedback downregulation of neurons in the PVN. A failure to increase serum TSH in response to hypothyroxinemia and to increased prepro-TRH mRNA expression indicates that alterations in posttranscriptional stages of TRH synthesis, processing, or release likely mediate the central hypothyroidism induced by sleep deprivation.
APA, Harvard, Vancouver, ISO, and other styles
7

Daehnke, Jon D. "A Heritage of Reciprocity." Public Historian 41, no. 1 (February 1, 2019): 64–77. http://dx.doi.org/10.1525/tph.2019.41.1.64.

Full text
Abstract:
Canoes, and the protocols attached to them, play a central role in cultural revitalization and resilience for many Indigenous nations of the Pacific Northwest. The revitalization of canoe culture is most visibly present in Tribal Journeys, a weeks-long paddle and gathering of Indigenous nations that annually brings together thousands of Native American/First Nations citizens. The Chinook Indian Nation has been an active and early participant in canoe resurgence in general, and Tribal Journeys specifically. For the Chinook, canoe protocols reflect a vision of “reciprocal heritage” that is located in embodied practice, is based in tribal cultural values of reciprocity and place, and is forward-looking. Perhaps most importantly, canoe culture and the performance of protocols occur explicitly outside of the framework of the colonial nation-state. In this sense the performance of protocol is not just an aspect of culture, it is fundamentally an act of decolonization.
APA, Harvard, Vancouver, ISO, and other styles
8

Zafar, Sardar Alfareed, Javed Iqbal, Tasnim Tahira, Naureen Javed, and Shagufta Noor. "LAPAROSCOPIC HYSTERECTOMY." Professional Medical Journal 25, no. 01 (January 10, 2018): 26–29. http://dx.doi.org/10.29309/tpmj/2018.25.01.532.

Full text
Abstract:
Hysterectomy is one of the most frequently performed gynaecological procedurein female. Objectives: The purpose of this study was to compare the outcome between totallaparoscopic hysterectomy and abdominal hysterectomy regarding blood loss during surgery,surgical time and postoperative hospital stay. Settings: Department of Gynecology & ObstetricsAllied Hospital, Faisalabad Medical University, Faisalabad. Period: 1st January 2016 - 31stDecember 2016 (1 Year). Study Design: Randomized control Study. Material & Methods: Theethical committee of Faisalabad Medical University, Faisalabad approved the study protocol. Thepatient demographical characteristics were similar in both groups. 112 patients were enrolled.Including 56 case of total laparoscopic hysterectomy and 56 cases of abdominal hysterectomywhich meets inclusion criteria. Result: Average blood loss in TLH was 83.09+10.74ml while itwas 387.88+59.54ml in TAH. When both groups were compared regarding operative time, itwas 76.73+20.2min in TLH while it was 84.7+19.9 in TAH. Postoperative stay in the hospitalwas 1.25+0.44 days in TLH while it was 5.72+0.83 in TAH. Conclusion: The laparoscopichysterectomy is a modern surgical method in current gynecological practice. With increasingexperience and good collaboration of surgical team, time duration can be shortened and bloodloss can be reduced to negligible.
APA, Harvard, Vancouver, ISO, and other styles
9

Izu, Marina, Zenith Rosa Silvino, Lucimere Maria dos Santos, and Carlos Marcelo Balbino. "Cuidados de enfermagem em pacientes submetidos a transplante de células-tronco hematopoiética: Protocolo de revisão de escopo." Research, Society and Development 9, no. 7 (May 30, 2020): e575974381. http://dx.doi.org/10.33448/rsd-v9i7.4381.

Full text
Abstract:
Trata-se de um protocolo de revisão de escopo sobre os cuidados de enfermagem em transplante de células-tronco hematopoiética. Tem como objetivo formalizar o estudo primário. O protocolo define os caminhos que serão adotados no estudo secundário de Revisão de Escopo e foi elaborado baseado no Preferred Reporting Items for Systematic Reviews and Meta-analysis Protocols (PRISMA-P) e no PRISMA Extension Scoping Reviews (PRISMA -ScR). Espera-se com a revisão mapear a evidência disponível na literatura sobre o cuidado de enfermagem em TCTH no ambiente hospitalar.
APA, Harvard, Vancouver, ISO, and other styles
10

Geris, KL, B. de Groef, SP Rohrer, S. Geelissen, ER Kuhn, and VM Darras. "Identification of somatostatin receptors controlling growth hormone and thyrotropin secretion in the chicken using receptor subtype-specific agonists." Journal of Endocrinology 177, no. 2 (May 1, 2003): 279–86. http://dx.doi.org/10.1677/joe.0.1770279.

Full text
Abstract:
Somatostatin (SRIH) functions as an endocrine mediator in processes such as growth, immune resistance and reproduction. Five SRIH receptors (sstr1-5) have been identified in mammals, where they are expressed in both the brain and peripheral tIssues. To study the specific function of each receptor subtype, specific agonists (ag1-5) have been synthesized. The high degree of homology between mammalian and avian SRIH receptors suggests that these agonists might also be used in chickens. In this paper we describe two in vitro protocols (static incubation and perifusion system) to identify the SRIH receptors controlling the secretion of GH and TSH from the chicken pituitary. We found that basal GH or TSH secretion were never affected when SRIH or an agonist (1 microM) were added. SRIH diminished the GH as well as the TSH response to TSH-releasing hormone (TRH; 100 nM) in both systems. Our results have indicated that the SRIH actions at the level of the pituitary are regulated through specific receptor subtypes. In both the static and flow incubations, ag2 lowered the GH response to TRH, whereas stimulated TSH release was diminished by both ag2 and ag5. Ag3 and ag4 tended to increase rather than decrease the responsiveness of both pituitary cell types to TRH in perifusion studies. Our data have indicated that SRIH inhibits chicken pituitary function through sstr2 and sstr5. Only sstr2 seems to be involved in the control of chicken GH release, whereas both sstr2 and sstr5 inhibit induced GH secretion in mammals. The possible stimulatory action of ag3 and ag4 may point towards a species-specific function of sstr3 and sstr4.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "TTH protocolo"

1

Caballero-Calixto, L., P. Antón-Puescas, and J. Reyna-Ormeño. "Efecto de la terapia manual en la cefalea tensional." Elsevier España S.L, 2017. http://hdl.handle.net/10757/622242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alotaibi, Abdullah S. "Design and evaluate a fair exchange protocol based on online trusted third party (TTP)." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7879.

Full text
Abstract:
One of the most crucial factors that e-commerce protocols should address is a fair exchange. In this research, an advanced method of cryptography coupled with the pay per use technique is used. A new electronic commerce protocol for the exchange of commodities is introduced. The proposed new protocol guarantees both features while addressing the main drawbacks associated with other related protocols. The new suggested e-commerce protocol is composed of two stages: pre-exchange and exchange stages. When the suggested new protocol is analysed with scrupulous protocol analysis, it attains fair exchange and a secure method of payment. The suggested new e-commerce protocol is more efficient than other related existing protocols. In this research “protocol prototype” and “model checking” is used for the purpose of authentication. The protocol prototype verifies that the suggested new protocol is executable when it's used in a real context. By experimental designs, this research shows the length of asymmetric keys as the biggest element that affects the efficiency of the protocol. When model-checking is applied in this protocol, the outcome indicates that the suggested protocol achieves the required features of fairness. Protocol extensions give those involved in the protocol the capacity to be resilient to failure. By using three methods of authentication, this research confirms that the new proposed protocol is well formulated. The work reported in this thesis first study the existing fair exchange protocols that solve the fairness problem. Then, propose more efficient protocol to solve the fairness problem. The original idea in this thesis is to reduce the communication overheads, risks and solve the bottleneck problems in the protocols that involve an online TTP.
APA, Harvard, Vancouver, ISO, and other styles
3

Bastos, Moisés Pereira. "Comparação entre Protocolos TTP/C e flexray utilizando uma aplicação brake-by-wire." Instituto Tecnológico de Aeronáutica, 2010. http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=1125.

Full text
Abstract:
O trabalho apresenta uma comparação entre protocolos de comunicação tolerantes a falha, TTP/C e Flexray, utilizando um simulador de tempo real, propondo modelar uma aplicação brake-by-wire tolerante a falhas que gere uma intensa troca de dados validando a comparação. O presente trabalho toma como base um modelo de um sistema de freio antitravamento (ABS - Antilock Brake System) para uma única roda, de Michaels e Quinn (1997), estendendo tal trabalho ao desenvolvimento de uma aplicação brake-by-wire, composta basicamente de 5 nós, sendo um controlador central e 4 nós locais apara as rodas do veículo. Após uma breve descrição introdutória sobre os conceitos básicos necessários para entender o projeto, a aplicação brake-by-wire será apresentada. Posteriormente serão apresentados conceitos de funcionamento da aplicação, tolerância a falha, controle de frenagem, entre outros. A modelagem e simulação do sistema foi realizada na ferramenta computacional TrueTime baseada no Matlab/Simulink, utilizando kernels de tempo real. A simulação demonstra os diferentes comportamentos da aplicação quando protocolos TTP/C e Flexray variam em largura de banda e taxa de utilização do barramento. Foi inserido um nó de interferência na rede, visando verificar o comportamento de tais protocolos com um trafego mais intenso na rede. Os resultados obtidos com a simulação de tempo real demonstram que o protocolo TTP/C apresentou um comportamento mais estável e seguro para tal aplicação considerada de tempo real crítico.
APA, Harvard, Vancouver, ISO, and other styles
4

Eslinger, Brian, and Bob Kovach. "RANGE COMMANDER’S COUNCIL (RCC) TELECOMMUNICATIONS AND TIMING GROUP (TTG) UPDATE ON TM OVER IP STANDARD DEVELOPMENT." International Foundation for Telemetering, 2007. http://hdl.handle.net/10150/604588.

Full text
Abstract:
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada
The RCC TTG initiated task TT-49 to generate a standard for the transport of serial streaming telemetry (TM) over the Internet Protocol (IP). An ad hoc committee was activated comprised of Range and vendor participation to develop this standard. This paper will address the progress of the standard, the use of commercial standards, and the benefits to the ranges. The early meetings focused on developing the packet structure; the preliminary results will be presented along with the latest status on the RCC approval cycle.
APA, Harvard, Vancouver, ISO, and other styles
5

Saragoça, Cristina Maria Rombão Cardoso Garcia. "Portugal nas redes internacionais do tráfico de seres humanos (Crianças)." Master's thesis, Instituto Superior de Economia e Gestão, 2010. http://hdl.handle.net/10400.5/2923.

Full text
Abstract:
Mestrado em Desenvolvimento e Cooperação Internacional
Muitas vezes chamado de "escravatura moderna," o TSH tem sido perpetrado por décadas, podemos até identificá-lo no início da sociedade humana. No entanto, ainda não se sabe muito sobre a sua dinâmica. De acordo com o último relatório do Departamento do Governo dos Estados Unidos (baseado em dados da Organização Internacional do Trabalho - OIT), o número de pessoas traficadas em matéria de trabalho forçado e de exploração sexual foi estimado em cerca de 12,3 milhões. Considerando essa grandeza, a ONG Terre des Hommes estima que um número de crianças situado entre os 300,000 milhões e os 1,2 milhões sejam traficadas por ano. Uma forma de combater e eliminar esse crime reside na tentativa de compreender as raízes do TSH e cada vez mais na importância do papel desempenhado pela Declaração Universal dos Direitos do Homem e pela Convenção sobre os Direitos da Criança. O tráfico de crianças é visto não só como uma violação grosseira dos direitos humanos, mas também como uma questão de trabalho infantil, entre outras formas de exploração. Este facto pode induzir à ideia de um conflito entre a economia e os direitos humanos em contextos de crise económica e social. O que numa perspectiva de globalização, resulta numa ampliação deste crime hediondo. Neste contexto, tendo em atenção o passado histórico e cultural português, a grande questão deste estudo é a de entender qual é a situação em Portugal, considerando as redes transnacionais de TSH e o seu modus operandi (com especial atenção para com as crianças). As respostas a esta questão são e foram muito difíceis de obter. Apenas foi possível aceder aos dados da Direcção-Geral da Administração Interna, da Associação de Planeamento Familiar, do Programa para a Prevenção e Eliminação da Exploração do Trabalho Infantil e do recém-criado Observatório para o Tráfico Humano.
Often called as "modern slavery," trafficking in human beings has been perpetrated for decades, we can even trace it at the beginning of human society. Nevertheless, we still do not know much about its dynamics. According to the latest report from the U.S. State Department (based on data from the International Labor Organization-ILO), the number of people trafficked concerning forced labor and sexual exploitation was estimated at about 12.3 million. Bearing it in mind, the NGO Terre des Hommes estimates that a number of children situated between 300,000,000,000 and 1.2000000 is trafficked every year. A way of combating and eliminating such a crime is to try and understand the roots of human trafficking and the increasingly importance of the role played by the Universal Declaration of Human Rights and the Convention on the Rights of the Child. Child trafficking is configured not only as a gross violation of human rights, but also as a matter of child labor, amongst other forms of exploitation. This fact may lead us to an idea of conflict between economy and human rights within contexts of economic and social crises. As far as globalization is concerned, it may also enforce this huge crime. So, taking due notice of the cultural and historical Portuguese past, the big question of this study is to understand what is the situation in Portugal considering the transnational nets of trafficking in human beings and their way of operating (with particular attention towards children). Answers to this question are and were very difficult to obtain. So, we could only access to data from the Portuguese Directorate-General of Internal Administration, the Association for Family Planning, the Program for the Prevention and Elimination of Child Labor Exploitation and the newly created Observatory for Human Trafficking.
APA, Harvard, Vancouver, ISO, and other styles
6

Petrov, David. "Komunikační systém malého mobilního robotu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219406.

Full text
Abstract:
This thesis addresses the problem of wireless transmission between the operator station and the robot. There is a solution presented by way of testing the parameters of wireless modules, compare them in the environment and the draft protocol.
APA, Harvard, Vancouver, ISO, and other styles
7

Olivka, Petr. "Stabilita hierarchické agregace pro internetové televizní vysílání." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218806.

Full text
Abstract:
This work is about Hierarchical agregation and it describes its parts in the rst part of this work. Next is described its parts, main features and properties in this rst part. Document describes the possibilities of realization. Second part describes an analysis of the stability problem. Realizes the detection of failures of the Feedback target stations by the implemented protocol. The protocol is programaticly realized in JAVA language and tested in the real enviroment. In this document it is described an function of bandwidth on the speed of failure detection. The issues of detection of failure on the feedback target manager machine are discussed in this document.
APA, Harvard, Vancouver, ISO, and other styles
8

Olejník, Tomáš. "Zpracování obchodních dat finančního trhu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412828.

Full text
Abstract:
The master's thesis' objective is to study basics of high-frequency trading, especially trading at foreign exchange market. Project deals with foreign exchange data preprocessing, fundamentals of market data collecting, data storing and cleaning are discussed. Doing decisions based on poor quality data can lead into fatal consequences in money business therefore data cleaning is necessary. The thesis describes adaptive data cleaning algorithm which is able to adapt current market conditions. According to design a modular plug-in application for data collecting, storing and following cleaning has been implemented.
APA, Harvard, Vancouver, ISO, and other styles
9

Pospíšil, Petr. "Optimalizace predikce pozice v síti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217436.

Full text
Abstract:
This work is about position prediction in network, it is focused to find Landmark closest to the Host in the network (with lowest distance vector). The algorithm is based on GNP system. In terms of GNP system simulation was selected method for mathematical part of position prediction. The method was Simplex Downhill. The designed algorithm was implemented in Java. In the first step chose Host continent by meassuring the distance vector. In next step is selected nearest part in the continent. In conclusion estimate Host its position and then closest Landmark. Results from this work is important for designing TTP protocol. The verdict is that the GNP can be used for TTP, but Landmarks must be located in uniform density.
APA, Harvard, Vancouver, ISO, and other styles
10

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "TTH protocolo"

1

Franklin, Martin E., Diana Antinoro, Emily J. Ricketts, and Douglas W. Woods. Treatment of Tic Disorders and Trichotillomania. Edited by Gail Steketee. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780195376210.013.0095.

Full text
Abstract:
This chapter briefly describes tic disorders and trichotillomania (TTM) and reviews the pharmacotherapy and psychosocial treatment outcome literature for each of these conditions. In contrast to anxiety or depression, distorted or maladaptive cognitions do not appear to play a central role in the etiology or maintenance of tic disorders and TTM, and therefore cognitive therapy is not emphasized in the psychosocial treatments studied to date. Treatment protocols are best characterized as “behavioral,” although some include ancillary cognitive interventions. Behavioral treatments that include habit reversal training (HRT) appear to hold the greatest promise for each of these conditions, and these are described in some detail. Future directions in treatment research are suggested.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "TTH protocolo"

1

Zhang, Feng, and Jun Chen. "Infarct Measurement in Focal Cerebral Ischemia: TTC Staining." In Springer Protocols Handbooks, 93–98. Totowa, NJ: Humana Press, 2012. http://dx.doi.org/10.1007/978-1-61779-782-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roscoe, A. W., and Peter Y. A. Ryan. "Auditable PAKEs: Approaching Fair Exchange Without a TTP." In Security Protocols XXV, 278–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ryan, Peter Y. A. "Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion)." In Security Protocols XXV, 298–305. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Chih-Hung. "Untraceable Fair Network Payment Protocols with Off-Line TTP." In Advances in Cryptology - ASIACRYPT 2003, 173–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40061-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hoffman, Alwyn, Johann Holm, and Henri-Jean Marais. "A Comparison of TTF and RTF UHF RFID Protocols." In RFID Systems, 231–68. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665251.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Decherf, Stéphanie, Zahra Hassani, and Barbara A. Demeneix. "In Vivo siRNA Delivery to the Mouse Hypothalamus Shows a Role of the Co-Chaperone XAP2 in Regulating TRH Transcription." In Gene Therapy Protocols, 355–66. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-248-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Wei, and Selwyn Piramuthu. "Protocol for Simultaneous Ownership Transfer of Multiple RFID Tags with TTP." In Advances in Network Security and Applications, 150–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Payeras-Capellà, M. Magdalena, Josep Lluís Ferrer-Gomila, and Llorenç Huguet-Rotger. "Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP." In Trust, Privacy, and Security in Digital Business, 60–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11537878_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bao, Feng, Robert Deng, Yongfei Han, and Albert Jeng. "Design and analyses of two basic protocols for use in TTP-based Key escrow." In Information Security and Privacy, 261–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liang, Ben, and Zygmunt J. Haas. "Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 1153–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_100.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "TTH protocolo"

1

Das, Mishu, Sagar Sarkar, and Shahid Md Asif Iqbal. "TTL based MaxProp routing protocol." In 2016 19th International Conference on Computer and Information Technology (ICCIT). IEEE, 2016. http://dx.doi.org/10.1109/iccitechn.2016.7860159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weiliang Zhao and V. Varadharajan. "Efficient TTP-free mental poker protocols." In International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II. IEEE, 2005. http://dx.doi.org/10.1109/itcc.2005.141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Xi, Xiangming Wen, Changxin Liang, Ye Liu, and Xinqi Lin. "Fair Security Protocols with Off-line TTP." In 2009 International Symposium on Intelligent Ubiquitous Computing and Education, IUCE. IEEE, 2009. http://dx.doi.org/10.1109/iuce.2009.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kopetz, H. "Fault Management in the Time Triggered Protocol (TTP)." In International Congress & Exposition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 1994. http://dx.doi.org/10.4271/940140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lyles, Joseph Bryan. "Custom networks, new protocols: Basis for a new cloud?" In 2012 IEEE Technology Time Machine (TTM). IEEE, 2012. http://dx.doi.org/10.1109/ttm.2012.6509043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yuanyuan Xu, Hongjuan Ge, Si Chen, and Shiyu Liu. "The application of TTP protocol in aircraft electrical system." In 2014 IEEE Transportation Electrification Conference and Expo, Asia-Pacific (ITEC Asia-Pacific). IEEE, 2014. http://dx.doi.org/10.1109/itec-ap.2014.6940767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Peidong, Xiangjiang Hu, Huayang Cao, and Xiaoqiang Wang. "TTM Based Security Enhancement for Inter-domain Routing Protocol." In 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mukherjee, Ranadeep, and Ambar Dutta. "An improved certified email protocol using an offline TTP." In 2012 Third International Conference on Emerging Applications of Information Technology (EAIT). IEEE, 2012. http://dx.doi.org/10.1109/eait.2012.6407993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiaoqiong, and Xueming Wang. "Formal Analysis Of Multi-party Non-repudiation Protocols Without TTP." In 2010 International Conference on Communications and Intelligence Information Security (ICCIIS). IEEE, 2010. http://dx.doi.org/10.1109/icciis.2010.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xi Wang, Xiangming Wen, Ye Liu, Xinqi Lin, and Ying Wang. "A fair non-repudiation security protocol with off-line TTP." In 2009 IEEE/INFORMS International Conference on Service Operations, Logistics and Informatics (SOLI). IEEE, 2009. http://dx.doi.org/10.1109/soli.2009.5203925.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "TTH protocolo"

1

Pignataro, C., and R. Asati. The Generalized TTL Security Mechanism (GTSM) for the Label Distribution Protocol (LDP). RFC Editor, August 2012. http://dx.doi.org/10.17487/rfc6720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agarwal, P., and B. Akyol. Time To Live (TTL) Processing in Multi-Protocol Label Switching (MPLS) Networks. RFC Editor, January 2003. http://dx.doi.org/10.17487/rfc3443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography