protocol

Poverty and Economic Dislocation Reduce Compliance with COVID-19 Shelter-in-Place Protocols [electronic journal].




protocol

A mild and convenient protocol for the synthesis of quinoxalin-2(1H)-ones and benzimidazoles

RSC Adv., 2024, 14,35386-35390
DOI: 10.1039/D4RA06887D, Paper
Open Access
Zhenbiao Luo, Mingyuan Wang, Guidong Jiang, Xinye Wang, Liang Zhao, Zhihui Hu, Honghe Li, Qing Ji
We present a mild and simple method for the cyclization of N-protected o-phenylenediamines with carbonyl compounds in the presence of trifluoroacetic acid.
The content of this RSS Feed (c) The Royal Society of Chemistry




protocol

Diagnostic protocols, more research needed to combat H. pylori challenge in India: experts

The bacterial infection, which often begins in childhood, is almost 10 times more prevalent than diabetes in the country and is a major cause of chronic gastritis, peptic ulcers and even stomach cancer, according to doctors




protocol

What is the flight protocol for a bomb threat?

What has been the loss incurred by Indian aviation due to frequent security threats over the past few weeks? What are the Standards and Recommended Practices to tackle such situations? Who sets up and monitors aviation guidelines? Can existing laws be tweaked to hand out more stringent punishment to offenders?




protocol

Covid-19: Assam tightens screening protocol; to take swab from all returnees

Assam has tightened the protocol for screening its citizens returning from outside the region following which every individual, symptomatic or asymptomatic and irrespective of the colour status of their originating location will be tested for Covid-19 and kept in institutional quarantine until the result of the test is obtained.




protocol

An enzyme-based protocol for cell-free synthesis of nature-identical capsular oligosaccharides from Actinobacillus pleuropneumoniae serotype 1 [Enzymology]

Actinobacillus pleuropneumoniae (App) is the etiological agent of acute porcine pneumonia and responsible for severe economic losses worldwide. The capsule polymer of App serotype 1 (App1) consists of [4)-GlcNAc-β(1,6)-Gal-α-1-(PO4-] repeating units that are O-acetylated at O-6 of the GlcNAc. It is a major virulence factor and was used in previous studies in the successful generation of an experimental glycoconjugate vaccine. However, the application of glycoconjugate vaccines in the animal health sector is limited, presumably because of the high costs associated with harvesting the polymer from pathogen culture. Consequently, here we exploited the capsule polymerase Cps1B of App1 as an in vitro synthesis tool and an alternative for capsule polymer provision. Cps1B consists of two catalytic domains, as well as a domain rich in tetratricopeptide repeats (TPRs). We compared the elongation mechanism of Cps1B with that of a ΔTPR truncation (Cps1B-ΔTPR). Interestingly, the product profiles displayed by Cps1B suggested processive elongation of the nascent polymer, whereas Cps1B-ΔTPR appeared to work in a more distributive manner. The dispersity of the synthesized products could be reduced by generating single-action transferases and immobilizing them on individual columns, separating the two catalytic activities. Furthermore, we identified the O-acetyltransferase Cps1D of App1 and used it to modify the polymers produced by Cps1B. Two-dimensional NMR analyses of the products revealed O-acetylation levels identical to those of polymer harvested from App1 culture supernatants. In conclusion, we have established a protocol for the pathogen-free in vitro synthesis of tailored, nature-identical App1 capsule polymers.




protocol

Crossing the ocean and crossing social protocols

OM workers from Latin America discuss the similarities and differences to Arab culture.




protocol

AFL players face season-ending bans for breaching COVID-19 protocols

AFL players breaching COVID-19 protocols face being suspended for the entire 2020 season.




protocol

The Economics of Transition to Internet Protocol version 6 (IPv6)

This report examines what economic theory can teach us about the reasons why the adoption of this latest Internet protocol is taking longer than was thought at its introduction.




protocol

‘Ensure complianceof Covid-19 protocols’




protocol

Honda Two-Wheeler Dealerships Across India To Restart Operations: Safety Protocols In Place

Honda Motorcycles & Scooters India (HMSI) has announced that with the relaxation in lockdown regulations by the government, the company will be restarting dealer operations across India. The reopening of Honda dealerships across the country will begin in a phase-wise manner.




protocol

Follow govt protocol before sending Noida-resident Vande Bharat Mission crew here: Gautam Buddh Nagar admin requests Air India




protocol

Protocol revised to discharge corona patients

From now on, only those with severe Covid-19 symptoms will need to undergo RT-PCR tests, that too only one and not two consecutive tests that were mandatory earlier, for their release from the hospital after treatment. Covid-positive patients with mild and moderate symptoms will no longer require the mandatory negative confirmatory tests before they are sent home.




protocol

Reset TCP/IP Protocol Suite




protocol

Evidence of Montreal Protocol's success in protecting ozone layer

The results of a new study appear to support the view that the Montreal Protocol has been effective at protecting the ozone layer. Researchers modelled the impacts of the Protocol's phasing out of ozone depleting substances and found that they matched actual changes of global ozone over the last 50 years.




protocol

SonoPath Announces Copyright and Trademark of SDEP® Ultrasound Protocol

SonoPath LLC announced the copyright and trademark approval of their popular SDEP® veterinary ultrasound training techniques: Sonographic Diagnostic Efficiency Protocol (SDEP) Small Animal Abdominal Imaging and Sonographic Diagnostic Efficiency




protocol

Chef Point Bar and Restaurant Implements Additional Protocols at Its Two Locations in Response to Coronavirus

Watauga and Colleyville Chef Point Restaurants Take Added Measures to Protect Diners and Employees




protocol

SCCM Pod-169 PCCM: Formal Handover Protocols Reduce Errors During Transition to the ICU

Brian F. Joy, MD, a fellow in the Department of Pediatric Cardiology at Childrens Memorial Hospital in Chicago, Illinois, USA, discussed an article published in the May 2011 Pediatric Critical Care Medicine




protocol

Santa Anita Hoping On-Site ‘Jockey Colony,’ Other COVID-19 Protocols Will Lead To Racing Resumption

Santa Anita Park officials are hoping to get word early this week from the Los Angeles County Board of Supervisors and the county's Department of Public of Health on whether racing can resume at the Arcadia, Calif., track. Belinda Stronach, whose family's company owns Santa Anita, and Aidan Butler, the executive director of California Racing […]

The post Santa Anita Hoping On-Site ‘Jockey Colony,’ Other COVID-19 Protocols Will Lead To Racing Resumption appeared first on Horse Racing News | Paulick Report.




protocol

A protocol using coho salmon to monitor Tongass National Forest Land and Resource Management Plan standards and guidelines for fish habitat

We describe a protocol to monitor the effectiveness of the Tongass Land Management Plan (TLMP) management standards for maintaining fish habitat. The protocol uses juvenile coho salmon (Oncorhynchus kisutch) in small tributary streams in forested watersheds. We used a 3-year pilot study to develop detailed methods to estimate juvenile salmonid populations, measure habitat, and quantitatively determine trends in juvenile coho salmon abundance over 10 years. Coho salmon have been shown to be sensitive to habitat alterations, and we use coho salmon parr as the primary indicator in the protocol. A priori criteria for type I and type II error rates, effect size, and sample sizes for the protocol were derived with estimates of variance computed from the 3-year pilot study. The protocol is designed to detect trends in abundance of coho salmon parr, as well as coho salmon fry and Dolly Varden (Salvelinus malma), in small streams managed according to TLMP standards and guidelines and to compare these to trends in unmanaged (old-growth) watersheds. Trends are adjusted to account for statistically significant habitat covariates. This information provides an important element in monitoring land management practices in the Tongass National Forest. The methods we describe may have application to monitoring protocols elsewhere for fish populations and land management practices.




protocol

PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. (arXiv:2004.03544v4 [cs.CR] UPDATED)

The global health threat from COVID-19 has been controlled in a number of instances by large-scale testing and contact tracing efforts. We created this document to suggest three functionalities on how we might best harness computing technologies to supporting the goals of public health organizations in minimizing morbidity and mortality associated with the spread of COVID-19, while protecting the civil liberties of individuals. In particular, this work advocates for a third-party free approach to assisted mobile contact tracing, because such an approach mitigates the security and privacy risks of requiring a trusted third party. We also explicitly consider the inferential risks involved in any contract tracing system, where any alert to a user could itself give rise to de-anonymizing information.

More generally, we hope to participate in bringing together colleagues in industry, academia, and civil society to discuss and converge on ideas around a critical issue rising with attempts to mitigate the COVID-19 pandemic.




protocol

Simulating Population Protocols in Sub-Constant Time per Interaction. (arXiv:2005.03584v1 [cs.DS])

We consider the problem of efficiently simulating population protocols. In the population model, we are given a distributed system of $n$ agents modeled as identical finite-state machines. In each time step, a pair of agents is selected uniformly at random to interact. In an interaction, agents update their states according to a common transition function. We empirically and analytically analyze two classes of simulators for this model.

First, we consider sequential simulators executing one interaction after the other. Key to the performance of these simulators is the data structure storing the agents' states. For our analysis, we consider plain arrays, binary search trees, and a novel Dynamic Alias Table data structure.

Secondly, we consider batch processing to efficiently update the states of multiple independent agents in one step. For many protocols considered in literature, our simulator requires amortized sub-constant time per interaction and is fast in practice: given a fixed time budget, the implementation of our batched simulator is able to simulate population protocols several orders of magnitude larger compared to the sequential competitors, and can carry out $2^{50}$ interactions among the same number of agents in less than 400s.




protocol

QuickSync: A Quickly Synchronizing PoS-Based Blockchain Protocol. (arXiv:2005.03564v1 [cs.CR])

To implement a blockchain, we need a blockchain protocol for all the nodes to follow. To design a blockchain protocol, we need a block publisher selection mechanism and a chain selection rule. In Proof-of-Stake (PoS) based blockchain protocols, block publisher selection mechanism selects the node to publish the next block based on the relative stake held by the node. However, PoS protocols may face vulnerability to fully adaptive corruptions. In literature, researchers address this issue at the cost of performance.

In this paper, we propose a novel PoS-based blockchain protocol, QuickSync, to achieve security against fully adaptive corruptions without compromising on performance. We propose a metric called block power, a value defined for each block, derived from the output of the verifiable random function based on the digital signature of the block publisher. With this metric, we compute chain power, the sum of block powers of all the blocks comprising the chain, for all the valid chains. These metrics are a function of the block publisher's stake to enable the PoS aspect of the protocol. The chain selection rule selects the chain with the highest chain power as the one to extend. This chain selection rule hence determines the selected block publisher of the previous block. When we use metrics to define the chain selection rule, it may lead to vulnerabilities against Sybil attacks. QuickSync uses a Sybil attack resistant function implemented using histogram matching. We prove that QuickSync satisfies common prefix, chain growth, and chain quality properties and hence it is secure. We also show that it is resilient to different types of adversarial attack strategies. Our analysis demonstrates that QuickSync performs better than Bitcoin by an order of magnitude on both transactions per second and time to finality, and better than Ouroboros v1 by a factor of three on time to finality.




protocol

Two Efficient Device Independent Quantum Dialogue Protocols. (arXiv:2005.03518v1 [quant-ph])

Quantum dialogue is a process of two way secure and simultaneous communication using a single channel. Recently, a Measurement Device Independent Quantum Dialogue (MDI-QD) protocol has been proposed (Quantum Information Processing 16.12 (2017): 305). To make the protocol secure against information leakage, the authors have discarded almost half of the qubits remaining after the error estimation phase. In this paper, we propose two modified versions of the MDI-QD protocol such that the number of discarded qubits is reduced to almost one-fourth of the remaining qubits after the error estimation phase. We use almost half of their discarded qubits along with their used qubits to make our protocol more efficient in qubits count. We show that both of our protocols are secure under the same adversarial model given in MDI-QD protocol.




protocol

Enabling Cross-chain Transactions: A Decentralized Cryptocurrency Exchange Protocol. (arXiv:2005.03199v1 [cs.CR])

Inspired by Bitcoin, many different kinds of cryptocurrencies based on blockchain technology have turned up on the market. Due to the special structure of the blockchain, it has been deemed impossible to directly trade between traditional currencies and cryptocurrencies or between different types of cryptocurrencies. Generally, trading between different currencies is conducted through a centralized third-party platform. However, it has the problem of a single point of failure, which is vulnerable to attacks and thus affects the security of the transactions. In this paper, we propose a distributed cryptocurrency trading scheme to solve the problem of centralized exchanges, which can achieve trading between different types of cryptocurrencies. Our scheme is implemented with smart contracts on the Ethereum blockchain and deployed on the Ethereum test network. We not only implement transactions between individual users, but also allow transactions between multiple users. The experimental result proves that the cost of our scheme is acceptable.




protocol

Retired Soccer Star Briana Scurry on Girls Soccer and Concussion Protocols

One out of two girls will sustain a concussion playing soccer, but most will recover and return to play with ease. Nevertheless, awareness and education are key to keeping players safe.




protocol

Data protocol

A method of transmitting data according to a data transmission protocol wherein the data is transmitted as a plurality of data frames and each data frame includes an error checking field comprising at least two sub-fields, the data of the first sub-field being formed by a first error checking method performed on data of the frame and the data of the second sub-field being formed by a second error checking method performed on the said data of the frame, the first and second methods being such that the data of the first sub-field has different error checking properties from those of the data of the second sub-field.




protocol

Scalable network security with fast response protocol

This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying on a standardized data format and communication structure, a general architecture can be created and used to dynamically build and reconfigure interaction between both similar and dissimilar security products. Use of an integration scheme having defined message types and specified query response framework provides for real-time response and easy adaptation for cross-vendor communication. Examples are provided where an intrusion detection system (IDS) can be used to detect network threats based on distributed threat analytics, passing detected threats to other security products (e.g., products with different capabilities from different vendors) to trigger automatic, dynamically configured communication and reaction. A network security provider using this infrastructure can provide hosted or managed boundary security to a diverse set of clients, each on a customized basis.




protocol

Reception according to a data transfer protocol of data directed to any of a plurality of destination entities

A data processing system arranged for receiving over a network, according to a data transfer protocol, data directed to any of a plurality of destination identities, the data processing system comprising: data storage for storing data received over the network; and a first processing arrangement for performing processing in accordance with the data transfer protocol on received data in the data storage, for making the received data available to respective destination identities; and a response former arranged for: receiving a message requesting a response indicating the availability of received data to each of a group of destination identities; and forming such a response; wherein the system is arranged to, in dependence on receiving the said message.




protocol

Data transfer method, system and protocol

A method for transmitting blocks of data in data packets from a first device on a network to a second device on the network comprising the steps of, providing a File Transmitter Application in communication with the first device, which File Transmitter Application is adapted to control the transmission of the blocks of data in data packets on the network, including the timing of the commencement of the transmission of the data blocks on the network, providing a File Receiver Application in communication with the second device and in communication with the File Transmitter Application, which File Receiver Application is adapted to transmit Acknowledgment data to the File Transmitter Application relating to the receipt of data blocks received at the second device, commencing the transmission of a first data block from the first device to the second device, by way of the network and commencing the transmission of the second data block from the first device to the second device, by way of the network.




protocol

Trivial file transfer protocol (TFTP) accelerated file retry option

A method of transferring data using a Trivial File Transport Protocol (TFTP) includes sending first request packet from client to server, first request packet requesting that first file be transferred; transferring first file according to first request packet if first acknowledgement packet is received at client from server indicating that server can accommodate request of first request packet; sending second request packet from client to the server if transfer of first file does not complete successfully, the second request packet including TFTP option indicating that transfer of first file be retried beginning at first block after final block that was successfully transferred in response to first request packet; and retrying transfer of first file according to second request packet if second acknowledgement packet is received at client from server indicating that server can accommodate request of second request packet.




protocol

Distributed cache coherency protocol

Systems, methods, and other embodiments associated with a distributed cache coherency protocol are described. According to one embodiment, a method includes receiving a request from a requester for access to one or more memory blocks in a block storage device that is shared by at least two physical computing machines and determining if a caching right to any of the one or more memory blocks has been granted to a different requester. If the caching right has not been granted to the different requester, access is granted to the one or more memory blocks to the requester.




protocol

Dynamically configuring and verifying routing information of broadcast networks using link state protocols in a computer network

A technique dynamically configures and verifies routing information of broadcast networks using link state protocols in a computer network. According to the novel technique, a router within the broadcast network receives a link state protocol routing information advertisement from an advertising router, e.g., a designated router or other adjacent neighbor. The router learns of a next-hop router (“next-hop”) to reach a particular destination from the advertisement, and determines whether the next-hop is located within the same broadcast network (e.g., subnet) as the designated router. If so, the router further determines whether the next-hop is directly addressable (i.e., reachable), such as, e.g., by checking for link adjacencies to the next-hop or by sending request/reply messages (e.g., echo messages or “ping” messages) to the next-hop. In the event the next-hop for the destination is not directly addressable by the router (e.g., no adjacency or reply), the router installs a route to the destination via the designated router. Otherwise, the router installs a route to the destination via the next-hop.




protocol

System and method including multiple processing lanes executing processing protocols

Systems and methods for processing and analyzing samples are disclosed. The system may process samples, such as biological fluids, using assay cartridges which can be processed at different processing locations. In some cases, the system can be used for PCR processing. The different processing locations may include a preparation location where samples can be prepared and an analysis location where samples can be analyzed. To assist with the preparation of samples, the system may also include a number of processing stations which may include processing lanes. During the analysis of samples, in some cases, thermal cycler modules and an appropriate optical detection system can be used to detect the presence or absence of certain nucleic acid sequences in the samples. The system can be used to accurately and rapidly process samples.




protocol

Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same

A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.




protocol

Configurable multi-lane scrambler for flexible protocol support

Various structures and methods are disclosed related to configurable scrambling circuitry. Embodiments can be configured to support one of a plurality of protocols. Some embodiments relate to a configurable multilane scrambler that can be adapted either to combine scrambling circuits across a plurality of lanes or to provide independent lane-based scramblers. Some embodiments are configurable to select a scrambler type. Some embodiments are configurable to adapt to one of a plurality of protocol-specific scrambling polynomials. Some embodiments relate to selecting between least significant bit (“LSB”) and most significant bit (“MSB”) ordering of data. In some embodiments, scrambler circuits in each lane are adapted to handle data that is more than one bit wide.




protocol

COMMUNICATION SYSTEM WITH SERIAL PORTS FOR AUTOMATICALLY IDENTIFYING DEVICE TYPES AND COMMUNICATION PROTOCOLS AND METHOD THEREOF

A communication system with serial ports for automatically identifying device types and communication protocols and method thereof are described. The communication system and method are capable of automatically identifying the device types and communication protocols of interface devices with different serial device numbers which are disposed in the serial port architecture. Furthermore, the drivers are capable of performing a serial communication based on the serial port architecture for matching the device types and communication protocols correspondingly, thereby reducing the development and manufacturing costs of communication system. Moreover, the user of an application program module only needs to provide the device numbers and data control information without the cooperation of hardware circuits and manufacturing technique of the interface devices to complete the automatic control and monitoring tasks of the interface devices to increase the utilization convenience.




protocol

CONTENTION WINDOW ADAPTATION IN MULTI-CARRIER LISTEN-BEFORE-TALK PROTOCOLS

A method and network node for adaptation of contention windows in a multicarrier wireless communication system implementing a listen-before-talk protocol are disclosed. According to one aspect, a method includes determining at least one component carrier (CC), of multiple CCs to serve as a backoff channel. The method further includes performing a listen-before-talk procedure on the at least one CC serving as a backoff channel. The listen-before-talk procedure includes sensing for each backoff channel whether a clear channel exists during a backoff period drawn from a contention window (CW). The LBT procedure also includes deferring transmitting on a CC for which the sensing does not indicate that a clear channel exists. The LBT procedure also includes transmitting on a CC for which the sensing indicates a clear channel exists. The method also includes determining a size of the CW based on at least one transmission feedback value.




protocol

Multi-Path Transmission Control Protocol

It is disclosed a MPTCP capable system for reducing disconnection time for a MPTCP capable UE (702), when it is leaving a coverage area of a second radio access type, when the second RAT typically has priority over the first RAT. This disclosure further comprises a controller of the second RAT (706), a MPTCP capable network proxy node(708), as well as a MPTCP network system therefore. In addition, methods and computer program in the respective arrangement are also presented.




protocol

Starbucks will reopen 85% of its coffee shops, but with new protocols


Starbucks this week started reopening stores in Seattle that had been closed to slow the spread of the coronavirus.




protocol

Starbucks will reopen 85% of its coffee shops, but with new protocols


Starbucks this week started reopening stores in Seattle that had been closed to slow the spread of the coronavirus.




protocol

Mission Impossible: Ghost Protocol

Death-defying set pieces, first class production, and a great director makes this one of the best films in the action/spy series.




protocol

Thriving Essential Businesses During COVID-19 / Reopening, Safety Protocols / Stay-At-Home Personal Pizza Kits

Today on Insight, we check in with essential businesses that are thriving during the pandemic. Sacramento County Health Services director Dr. Peter Bielenson shares his thoughts on reopening and other safety protocols, and at-home pizza kits




protocol

Review of Alpha Protocol (Windows)

A review by Medio DeCritici (165). A 2020 Review - Alpha Protocol (PC, 2010)




protocol

Reticence Extras: CP3 Straw Hats of the 1890s for Primrose in the Custard Protocol Series by Gail Carriger


Went to the Degas exhibit a little while ago, Fashionable Reader. Here's a retrospective on some of the straw hats of the 1890s that I saw there. These may, or may not, show up on Primrose in the forthcoming Custard Protocol book.

Image taken by Gail Carriger, do not share without attribution

Made me think of Ivy...


Image taken by Gail Carriger, do not share without attribution

Image taken by Gail Carriger, do not share without attribution
 
Retro Rack is also on facebook where I post additional images and fashion thoughts.

You can shop my recommendations via the following lists:
Steampunk, Retro Jewelry, Makeup, Retro Clothes, Lifestyle


Product links on this blog are usually to Amazon using my associate code. At no additional cost to you this means I get a slight kick back if you make a purchase. Thank you! This allows me to continue to produce this blog without sponsors.




protocol

Sandals reopening next month with enhanced cleaning protocols

Caribbean resorts to reopen from June 4




protocol

Lakers wait on the NBA to decide protocol of games amid coronavirus outbreak

The Lakers and the NBA are trying to deal with the coronavirus and how it might affect the rest of the season.




protocol

The resumption of NBA season might rely on protocols not yet available

Before NBA play can resume, a number of medical protocols should be in place to protect players, staff and arena workers. Medical experts say that is a problem.




protocol

First day of MLB coronavirus protocol involves six feet of separation for Angels

Angels manager Joe Maddon can hardly fathom playing regular-season games in stadiums empty of fans, yet he commented from a six-foot distance of reporters.




protocol

Cruise: Travellers must abide by these strict protocols for future cruise holidays



CRUISE holidays are currently on hold, but new plans to implement safety regulations means that travellers must fit certain health criteria in order to sail. What will the new measures entail?