Artículos de revistas sobre el tema "Host identity protocol"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Host identity protocol.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Host identity protocol".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Malik, Gaurav y Anshul Anand. "Real Study of Host Identity Protocol". International Journal of Computer Trends and Technology 11, n.º 5 (25 de mayo de 2014): 231–33. http://dx.doi.org/10.14445/22312803/ijctt-v11p149.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Levä, Tapio, Miika Komu, Ari Keränen y Sakari Luukkainen. "Adoption barriers of network layer protocols: The case of host identity protocol". Computer Networks 57, n.º 10 (julio de 2013): 2218–32. http://dx.doi.org/10.1016/j.comnet.2012.11.024.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ben Jemaa, Maher, Nahla Abid, Maryline Laurent-Maknavicius y Hakima Chaouchi. "Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks". Journal of Computer Systems, Networks, and Communications 2009 (2009): 1–6. http://dx.doi.org/10.1155/2009/383517.

Texto completo
Resumen
The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Yang, Shuigen, Huachun Zhou, Yajuan Qin y Hongke Zhang. "SHIP: Cross-layer mobility management scheme based on Session Initiation Protocol and Host Identity Protocol". Telecommunication Systems 42, n.º 1-2 (12 de junio de 2009): 5–15. http://dx.doi.org/10.1007/s11235-009-9164-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Faigl, Zoltán y Miklós Telek. "Modeling the signaling overhead in Host Identity Protocol-based secure mobile architectures". Journal of Industrial & Management Optimization 11, n.º 3 (2015): 887–920. http://dx.doi.org/10.3934/jimo.2015.11.887.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bokor, László, Zoltán Faigl y Sándor Imre. "Survey and Evaluation of Advanced Mobility Management Schemes in the Host Identity Layer". International Journal of Wireless Networks and Broadband Technologies 3, n.º 1 (enero de 2014): 34–59. http://dx.doi.org/10.4018/ijwnbt.2014010103.

Texto completo
Resumen
This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors' goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to create a novel framework for future Mobile Internet architectures. In order to achieve this, the authors also perform an extensive simulation evaluation of four selected mobility solutions in the Host Identity Layer: the standard HIP mobility/multihoming (RFC5206), a micromobility solution (µHIP), a network mobility management scheme (HIP-NEMO) and a proactive, cross-layer optimized, distributed proposal designed for flat architectures (UFA-HIP).
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hossain, Mahmud y Ragib Hasan. "P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things". IEEE Internet of Things Journal 8, n.º 1 (1 de enero de 2021): 555–71. http://dx.doi.org/10.1109/jiot.2020.3009024.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Nikander, Pekka, Andrei Gurtov y Thomas R. Henderson. "Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks". IEEE Communications Surveys & Tutorials 12, n.º 2 (2010): 186–204. http://dx.doi.org/10.1109/surv.2010.021110.00070.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Porambage, Pawani, An Braeken, Pardeep Kumar, Andrei Gurtov y Mika Ylianttila. "CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things". Wireless Personal Communications 96, n.º 1 (29 de abril de 2017): 421–40. http://dx.doi.org/10.1007/s11277-017-4176-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Lee, Chan Haeng y Ji Su Park. "A Design for SDN-Based Identifier–Locator Separation Architecture on IoT Networks". Applied Sciences 10, n.º 6 (21 de marzo de 2020): 2144. http://dx.doi.org/10.3390/app10062144.

Texto completo
Resumen
In upcoming smart urban environments, various things can be interconnected, and the Internet of Things (IoT) can be used to construct a safer and more convenient urban environment. Things in the IoT need an addressing system that can uniquely identify each one; internet protocol (IP) addresses can be used for this purpose. The IP address the two roles of an identifier and a locator. However, this binding has problems related to mobility and multihoming, and it is hard to deploy on a legacy IP system because of some limitations of sensor devices. To solve the problem, we propose a design for software-defined networking (SDN)-based identifier–locator separation architecture on IoT networks. In the proposed scheme, Internet Protocol version 6(IPv6)-based addresses are used for the identifiers and locators. The network is partitioned into a host identity domain for local routing and an IP domain for global routing. The host identity domain operates as an overlaid network over the IP domain, and it makes the unrouteable identifiers routable with a distributed hash table (DHT)-based routing strategy. For the evaluation of the proposed scheme, a packet forwarding cost and signaling cost model is calculated, and the results show that the proposed scheme is conjugable to an IoT network environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Toledo, Nerea, Marivi Higuero, Jasone Astorga, Marina Aguado y Jean Marie Bonnin. "Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol". Computers & Security 32 (febrero de 2013): 1–18. http://dx.doi.org/10.1016/j.cose.2012.09.014.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Wu, Shao Xing, Yu Jun Ma y Yan Tie Xiang. "A Secure Networking Architecture for the Internet of Things". Advanced Materials Research 108-111 (mayo de 2010): 135–40. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.135.

Texto completo
Resumen
This article describes innovative and highly secure network architecture, dedicated to internet of things. We recommend that the infrastructure, there is a new label project, to support the upcoming launch of the standard Host Identity Protocol (HIP). Our main concern is to ensure the privacy of RFID tags, while enabling things to things communications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Sandal-Önal, Elif, Aydın Bayad, Andreas Zick y N. Ekrem Düzen. "Transnational Influences on Migrant Identities and Social Cohesion: A Study Protocol". Genealogy 6, n.º 1 (24 de enero de 2022): 9. http://dx.doi.org/10.3390/genealogy6010009.

Texto completo
Resumen
This project examines how Turkish postmigrants in Germany position themselves against the influences of the German state’s integration and the Turkish government’s diasporic policies. We argue that the double influx of host and home states lures Turkish postmigrants into an identity trap subjecting their in-between position to exploitation in transnational negotiations. As their own perspective is poorly addressed in literature, this study fills this gap by reference to postmigrants’ standpoint. We hypothesize that the positioning of Turkish postmigrants in Germany is reflected through identity expressions and priority of belongings. We will carry out an exploratory assessment with three work packages. Study 1 will decode the Turkish postmigrant figure addressed by both states. Major media outlets most attended by postmigrants will be analyzed to display the imagined figure. Study 2 will inform the trajectory of the Turkish national identity narrative across important milestones over the migration chronology. A structured archival study will unearth the discursive mutations through political leaders’ speeches. Finally, Study 3 will exclusively confer postmigrants’ viewpoints against both influences. The project consults a conceptual framework in terms of diaspora generating, diaspora shaping, collective nostalgia, and social cohesion to expand on understanding how Turkish postmigrants express their identities and prioritize their belongings across their in-between existence.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Veeraraghavan, Prakash, Dalal Hanna y Eric Pardede. "Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network". Electronics 8, n.º 10 (14 de octubre de 2019): 1162. http://dx.doi.org/10.3390/electronics8101162.

Texto completo
Resumen
Internet Protocol (IP) multicasting is a method for one-to-many and many-to-many communication between hosts in an IP network. This communication happens in a real-time synchronous fashion. It is a useful mechanism for distributing management data in a Local Area Network (LAN). Management data includes frequent updating of host Operating System (OS), security patches, OS update for network hardware, new configuration updates, etc. In the absence of any admission control or a source identification, any host with malicious intent can disseminate malicious codes or rootkits exploiting the underlying multicast framework. Routing protocols like RIPv2 and OSPF use a certain form of authentication to exchange routing information with their peer routers. However, their authentication and the distribution of routing information in its present form has several security and performance-related issues. Motivated through these problems, in this paper, we propose an efficient and scalable multicast architecture for distributing management and routing information in a LAN. We use Core-based Tree (CBT) for constructing the multicast delivery tree and the pseudo identity-based encryption of the underlying cryptosystem. We also demonstrate that our proposed multicast architecture is immune to a number of popular attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Singh, R. P., A. D. Dilworth, V. K. Baranwal y K. N. Gupta. "Detection of Citrus exocortis viroid, Iresine viroid, and Tomato chlorotic dwarf viroid in New Ornamental Host Plants in India". Plant Disease 90, n.º 11 (noviembre de 2006): 1457. http://dx.doi.org/10.1094/pd-90-1457a.

Texto completo
Resumen
Columnea latent viroid, originating from ornamental plants, is known to be harmful to crop plants (2). Despite the potential threat to crop plants, the importance of ornamental plants in viroid evolution is not fully appreciated. Availability of a Pospiviroid genus-specific primer pair (1) to detect the most prevalent viroids in ornamental plants and a simplified nucleic acid preparation protocol (3) for use in reverse-transcription polymerase chain reaction (RT-PCR) have facilitated surveys of ornamental plants for pospiviroids. Using the above protocol in India, leaf and shoot samples were collected randomly from roadside beds consisting of ground covers or creepers/trailing plants at the IARI campus, New Delhi. These were extracted in 50 mM NaOH + 2.5 mM EDTA solution, centrifuged to sediment the coarse debris from sap, and 10 μl of the supernatant was spotted on a nitrocellulose membrane. Individual spots were eluted with distilled sterile water (30 μl) and the eluates were used for RT-PCR detection of viroids (3). Amplified fragments or subsequently cloned plasmids were also purified using NaOH-EDTA membrane protocol. Cloning and sequencing of amplicons (195 to 224 bp) revealed a very high sequence identity with specific viroids from the viroid sequence database (NCBI). Among the 19 plant samples assayed, only three plant species were infected by viroids, although none of them exhibited any symptoms. The three plant species included: (i) moss verbena, Glandularia puchella (Verbenaceae, native to Argentina and Chile, now established in several regions of the world), infected with a viroid (Accession No. DQ846884) having 99% sequence identity to Citrus exocortis viroid (CEVd) (Accession No. S67446); (ii) trailing verbena, Verbena × hybrida (Verbenaceae, ornamental plant), doubly infected with a viroid (Accession No. DQ846885) having 95% sequence identity to CEVd (Accession No. DQ094297) and infected with another viroid (Accession No. DQ846883) having 98% sequence identity to Tomato chlorotic dwarf viroid (TCDVd) (Accession No. AF162131); and (iii) red joyweed, Alternanthera sessilis (Amaranthaceae, a perennial weed herb) infected with a viroid (Accession No. DQ846886) having 96% sequence identity to Iresine viroid (IrVd) (Accession No. DQ094293). CEVd and TCDVd were mechanically transferred to tomato seedlings causing reduced growth of plants, smaller leaves, and bunchy-top appearance of plants, symptoms similar to those typically observed with other isolates of these viroids. As expected from previous studies, IrVd was not transmitted to tomato plants. Natural infection of verbena with CEVd has been detected in North America (2) but this was a novel observation in India. Additional novel observations include: A. sessilis as a new host for IrVd; and TCDVd is the first crop viroid to be isolated from a naturally infected ornamental plant. The significance of these viroid findings in ground cover and widely grown ornamental plants may lie in their potential role in spreading the viroids to citrus plants in citrus-growing countries such as India. References: (1) H. Bostan et al. J. Virol. Methods 116:189, 2004, (2) R. P. Singh and J. A. Teixeira da Silva. Floriculture, Ornamental Plant Biotechnol. 3:531, 2006. (3) R. P. Singh et al. J. Virol. Methods 132:204, 2006.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Weliwita, Chathurika. "Performance Study on 5G - NSA Backhaul Network Secured with HIP". International Journal of Advanced Networking and Applications 14, n.º 06 (2023): 5705–16. http://dx.doi.org/10.35444/ijana.2023.14607.

Texto completo
Resumen
Fifth generation Non-Stand Alone (5G-NSA) mode offers users an earlier 5G experience before worldwide Stand Alone 5G implementation (5G-SA). In 5G-NSA, operators utilize the existing fourth-generation (4G) networks to provide pre-5G services. In some 5G-NSA deployments, the 4G backhaul network connects the 5G core (5GC) or 4G evolved packet core (EPC) to the 5G new radio (5G NR) network. Nevertheless, implementing security in all network segments is essential to assure end-to-end security in 5G-NSA implementations. Operators must use Internet Protocol security (IPsec) to secure user plane transmissions through 4G backhaul. Host Identity Protocol (HIP) is an alternative method to implement IPsec without disturbing radio or core network protocols to provide node authentication, data encryption with integrity protection, and replay protection to the user plane. This study evaluates the effectiveness of the secure HIP-4G backhaul network to assure end-to-end security in 5G-NSA. According to the results, HIP implementation does not delay message transmissions. Only a slight delay occurs at the security session establishment phase in the HIP Base Exchange process. Hence the HIP implemented 4G backhaul is appropriate to assure end-to-end security in 5G-NSA until the 5G-SA internetworking solutions are implemented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Faigl, Zoltán. "Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?" Wireless Networks 21, n.º 2 (6 de septiembre de 2014): 531–55. http://dx.doi.org/10.1007/s11276-014-0797-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Kaňuch, Peter y Dominik Macko. "E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks". Sensors 19, n.º 22 (12 de noviembre de 2019): 4921. http://dx.doi.org/10.3390/s19224921.

Texto completo
Resumen
The rapidly growing segment of the Internet of Things (IoT) makes the security threats more prominent than ever. The research around communication security and cybersecurity in such networks is still a challenge, mainly due to the typically limited energy and computation resources of IoT devices. The strong security mechanisms require significant power and thus the energy wastage must be minimized. Optimized application-specific security protocols are commonly used to make the data transfer more efficient, while still offering a high level of security. The supported security features, such as confidentiality, integrity or authenticity, should not be affected by the optimization. Our work is focused on optimizing one of the existing security protocols for the use in the IoT area, namely the Host Identity Protocol (HIP). Based on the analysis of related works, we have identified multiple possibilities for optimization and combined some of them into the proposed E-HIP optimized protocol. For verification purpose, it has been implemented as a modification of the open-source OpenHIP library and applied on a communication between real hardware devices. The secured communication worked correctly. The resulting effect of the proposed optimization has been evaluated experimentally and it represents an increase in energy efficiency by about 20%. Compared to other HIP optimizations, the achieved results are similar; however, the proposed optimizations are unique and can be further combined with some of the existing ones to achieve even higher efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Liu, Xing Yu. "A Handoff Mechanism to Support Micro-Mobility of HIP". Advanced Materials Research 505 (abril de 2012): 317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.505.317.

Texto completo
Resumen
HIP (Host Identity Protocol) is the current standard for supporting global mobility, however the performance degrades to support micro-mobility. In accordance with the idea of micro-mobility of mobile IP, the mobile node range of motion is divided into different administrative areas, different management areas correspond to different RVS (Rendezvous Server), we can get a mechanism to support micro-mobility management. Theoretical analysis shows that such mechanism than traditional HIP has an advantage in handoff performance, not only can reduce the handoff delay, packet loss rate and increase the success rate of handoff, but also good support micro-mobility.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Varjonen, Samu, Miika Komu y Andrei Gurtov. "Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Locator Split". Journal of Communications Software and Systems 6, n.º 1 (21 de marzo de 2010): 1. http://dx.doi.org/10.24138/jcomss.v6i1.193.

Texto completo
Resumen
Internet architecture is facing at least three major challenges. First, it is running out of IPv4 addresses. IPv6 offers a long-term solution to the problem by offering a vast amount of addresses but is neither supported widely by networking software nor has been deployed widely in different networks. Second, end-to-end connectivity is broken by the introduction of NATs, originally invented to circumvent the IPv4 address depletion. Third, the Internet architecture lacks a mechanism that supports end-host mobility and multihoming in a coherent way between IPv4 and IPv6 networks. We argue that an identifier-locator split can solve these three problems based on our experimentation with the Host Identity Protocol. The split separates upper layer identifiers from lower network layer identifiers, thus enabling network-location and IPversionindependent applications. Our contribution consists of recommendations to the present HIP standards to utilize cross-family mobility more efficiently based on our implementation experiences. To the best of our knowledge we are also the first ones to show a performance evaluation of HIP-based cross-family handovers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Lindqvist, Janne, Essi Vehmersalo, Miika Komu y Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities". International Journal of Handheld Computing Research 1, n.º 1 (enero de 2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.

Texto completo
Resumen
Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Bettoumi, Balkis y Ridha Bouallegue. "LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things". Sensors 21, n.º 21 (4 de noviembre de 2021): 7348. http://dx.doi.org/10.3390/s21217348.

Texto completo
Resumen
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity Protocol Diet EXchange (HIP DEX) is primarily designed to be suitable for constrained devices and designed to be resistant to Denial of Service (DoS) and man-in-the-middle (MITM) attacks. In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) communications based on the compression of the IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) header for HIP DEX packets. We implement our solution in an IoT based-WSN over Constrained Application Protocol (CoAP) in the application layer and Routing Protocol for Low power and lossy networks (RPL) in the routing layer. We also propose a novel distribution model that minimizes the number of signaling messages. Both proposed compression and distribution models for HIP DEX combined with an original implementation of an opportunistic association establishment of the handshake, constitute an efficient security solution for IoT. We called our solution Lightweight Compressed HIP DEX in the IoT (LC-DEX).
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Beirn, Lisa A., William A. Meyer, Bruce B. Clarke y Jo Anne Crouch. "A Greenhouse-based Inoculation Protocol for Fungi Causing Crown Rust and Stem Rust Diseases of Kentucky Bluegrass Turf". HortScience 50, n.º 10 (octubre de 2015): 1509–13. http://dx.doi.org/10.21273/hortsci.50.10.1509.

Texto completo
Resumen
Rusts are destructive fungal diseases that can cause severe thinning and unattractive discoloration of kentucky bluegrass (KBG; Poa pratensis L.). Currently, turfgrass breeding programs rely on field evaluations to screen KBG germplasm for rust resistance; methods that are expensive, labor intensive, and require large turf areas. The availability of a greenhouse-based assay to perform prescreening of KBG germplasm for resistance to rust diseases before field trials would allow breeders to remove the poorest performing plants before field evaluations thus enhancing breeding efficiency. In this study, we set out to develop a reliable, low-cost greenhouse inoculation protocol for the two most common rust pathogens of KBG in temperate growing regions: Puccinia coronata and Puccinia graminis, the causal agents of crown and stem rust, respectively. Using a modified inoculation assay and custom-built plexi-glass chambers adapted from protocols used for cereal rust pathogens, urediniospores of crown and stem rust fungi developed on inoculated plants 10 to 14 days postinoculation. Real-time polymerase chain reaction (PCR) assays, disease symptomology, and morphology of urediniospores confirmed the presence and identity of both rust pathogens from inoculated host tissue. The inoculation protocols described here represent an effective method to accelerate screening of KBG germplasm for resistance to crown and stem rust diseases. Infection of KBG plants in the greenhouse will also allow breeders to maintain populations of crown and stem rust fungi throughout the year, providing a reliable and ongoing source of pathogen inoculum for experimentation and screening in the future.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Krstic, Predrag. "Reflecting the secret". Theoria, Beograd 50, n.º 2 (2007): 35–46. http://dx.doi.org/10.2298/theo0702035k.

Texto completo
Resumen
Parallel analysis of children's literature on one hand, and the crime genre on the other, positing children's and serious construction of the world and ego, outlining homology of their narrative and reconstructing social construct that follows, assumes that light could be thrown at certain particularity that is a parasite on a host whom it would like to legitimate. Juxtaposition of the two worlds, or, often, the world whiten the world visualizes the image, an inward tension and perversion of the world for which the attraction of secret service with an aspiration to public action makes it particular. The established analogy directs the attention at two points that mark particularity of the world of secrets: the protocol of the concealment and secret action and to the motives for shifting, compounding and acquiring the identity that follows.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Rosati, Fau, Valentina Coletta, Jessica Pistella, Cristiano Scandurra, Fiorenzo Laghi y Roberto Baiocco. "Experiences of Life and Intersectionality of Transgender Refugees Living in Italy: A Qualitative Approach". International Journal of Environmental Research and Public Health 18, n.º 23 (25 de noviembre de 2021): 12385. http://dx.doi.org/10.3390/ijerph182312385.

Texto completo
Resumen
Transgender refugees are at risk of experiencing increased minority stress due to experiences of trauma in their country of origin, and the intersection of multiple marginalized identities in their host country. Adopting a transfeminist and decolonial approach, the present study aimed at exploring transgender refugees’ experiences of life and migration. A semi-structured interview protocol was developed, grounded in the perspectives of minority stress and intersectionality. Participants were five transgender refugees (four women and one non-binary) from different cultural/geographic contexts, professing different religions. Using thematic analysis, the researchers identified three themes: pre- and post-migration minority stress and transphobia; religion as a protective factor for gender affirmation; and individuation and the synthesis of social identities. Participants reported traumatic experiences and the inability to openly live out their gender identity in their country of origin as the main push factors to migration. They also reported feelings of isolation and experiences of victimization during interactions with the Italian asylum services, due to a lack of adequate training, racial prejudice, and transphobia. Participants demonstrated positive individuation, linked to gender affirmation treatments and religious protective factors. The interview protocol may be used by social operators to support the claims of transgender asylum seekers, and to clinically assess transgender people with an immigrant background.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Salhi, Dhai Eddine, Abelkamel Tari y Mohand Tahar Kechadi. "Using Clustering for Forensics Analysis on Internet of Things". International Journal of Software Science and Computational Intelligence 13, n.º 1 (enero de 2021): 56–71. http://dx.doi.org/10.4018/ijssci.2021010104.

Texto completo
Resumen
In the world of the internet of things (IoT), many connected objects generate an enormous amount of data. This data is used to analyze and make decisions about specific phenomena. If an object generates wrong data, it will influence the analysis of this collected data and the decision later. A forensics analysis is necessary to detect IoT nodes that are failing. This paper deals with a problem: the detection of these nodes, which generate erroneous data. The study starts to collect in a cloud computing server temperature measurements (the case study); using temperature sensors, the communication of the nodes is based on the HIP (host identity protocol). The detection is made using a data mining classification technique, in order to group the connected objects according to the collected measurements. At the end of the study, very good results were found, which opens the door to further studies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Huguet, Valerie, Janet Mccray Batzli, Jeff F. Zimpfer, Philippe Normand, Jeffrey O. Dawson y Maria P. Fernandez. "Diversity and Specificity of Frankia Strains in Nodules of Sympatric Myrica gale, Alnus incana, andShepherdia canadensis Determined by rrsGene Polymorphism". Applied and Environmental Microbiology 67, n.º 5 (1 de mayo de 2001): 2116–22. http://dx.doi.org/10.1128/aem.67.5.2116-2122.2001.

Texto completo
Resumen
ABSTRACT The identity of Frankia strains from nodules ofMyrica gale, Alnus incana subsp. rugosa, andShepherdia canadensis was determined for a natural stand on a lake shore sand dune in Wisconsin, where the three actinorhizal plant species were growing in close proximity, and from two additional stands with M. gale as the sole actinorhizal component. Unisolated strains were compared by their 16S ribosomal DNA (rDNA) restriction patterns using a direct PCR amplification protocol on nodules. Phylogenetic relationships among nodular Frankia strains were analyzed by comparing complete 16S rDNA sequences of study and reference strains. Where the three actinorhizal species occurred together, each host species was nodulated by a different phylogenetic group of Frankia strains. M. gale strains from all three sites belonged to an Alnus-Casuarina group, closely related to Frankia alni representative strains, and were low in diversity for a host genus considered promiscuous with respect to Frankia microsymbiont genotype.Frankia strains from A. incana nodules were also within the Alnus-Casuarina cluster, distinct fromFrankia strains of M. gale nodules at the mixed actinorhizal site but not from Frankia strains from twoM. gale nodules at a second site in Wisconsin.Frankia strains from nodules of S. canadensisbelonged to a divergent subset of a cluster ofElaeagnaceae-infective strains and exhibited a high degree of diversity. The three closely related local Frankiapopulations in Myrica nodules could be distinguished from one another using our approach. In addition to geographic separation and host selectivity for Frankia microsymbionts, edaphic factors such as soil moisture and organic matter content, which varied among locales, may account for differences in Frankiapopulations found in Myrica nodules.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

K.C, Amir, Harri Forsgren, Kaj Grahn, Timo Karvi y Göran Pulkkis. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast". International Journal of Dependable and Trustworthy Information Systems 2, n.º 3 (julio de 2011): 17–35. http://dx.doi.org/10.4018/jdtis.2011070102.

Texto completo
Resumen
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Hendrickson, Erik L., Pablo Guevera, Alejandro Peñaloza-Vàzquez, Jing Shao, Carol Bender y Frederick M. Ausubel. "Virulence of the Phytopathogen Pseudomonas syringae pv. Maculicola Is rpoN Dependent". Journal of Bacteriology 182, n.º 12 (15 de junio de 2000): 3498–507. http://dx.doi.org/10.1128/jb.182.12.3498-3507.2000.

Texto completo
Resumen
ABSTRACT We cloned the rpoN (ntrA andglnF) gene encoding ς54 from the phytopathogen Pseudomonas syringae pv. maculicola strain ES4326. The P. syringae ES4326 rpoN gene complemented Pseudomonas aeruginosa, Escherichia coli, and Klebsiella aerogenes rpoN mutants for a variety of rpoN mutant phenotypes, including the inability to utilize nitrate as sole nitrogen source. DNA sequence analysis of the P. syringae ES4326 rpoN gene revealed that the deduced amino acid sequence was most similar (86% identity; 95% similarity) to the ς54 protein encoded by thePseudomonas putida rpoN gene. A marker exchange protocol was used to construct an ES4326 rpoN insertional mutation,rpoN::Kmr. In contrast to wild-type ES4326, ES4326 rpoN::Kmr was nonmotile and could not utilize nitrate, urea, C4-dicarboxylic acids, several amino acids, or concentrations of ammonia below 2 mM as nitrogen sources.rpoN was essential for production of the phytotoxin coronatine and for expression of the structural genes encoding coronamic acid. In addition, ES4326rpoN::Kmr did not multiply or elicit disease symptoms when infiltrated into Arabidopsis thalianaleaves, did not elicit the accumulation of severalArabidopsis defense-related mRNAs, and did not elicit a hypersensitive response (HR) when infiltrated into tobacco (Nicotiana tabacum) leaves. Furthermore, whereas P. syringae ES4326 carrying the avirulence gene avrRpt2elicited an HR when infiltrated into Arabidopsis ecotype Columbia leaves, ES4326 rpoN::Kmrcarrying avrRpt2 elicited no response. Constitutive expression of ES4326 hrpL in ES4326rpoN::Kmr partially restored defense-related mRNA accumulation, showing a direct role for thehrp cluster in host defense gene induction in a compatible host-pathogen interaction. However, constitutive expression ofhrpL in ES4326 rpoN::Kmrdid not restore coronatine production, showing that coronatine biosynthesis requires factors other than hrpL.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Kaur, R., A. R. McTaggart, D. M. Ferrin y M. C. Aime. "First Report of Uromyces plumbarius, Rust of Gaura, in Louisiana and a new host, Guara lindheimeri". Plant Disease 96, n.º 4 (abril de 2012): 590. http://dx.doi.org/10.1094/pdis-12-11-1020.

Texto completo
Resumen
Gaura lindheimeri Engelm. & A. Gray (Onagraceae) is an ornamental shrub that is native to southern Louisiana and Texas. Its texture and form make it a popular perennial border plant. In April 2010 and 2011, three collections of Guara leaf samples with signs and symptoms of a rust disease were made from a home garden in Baton Rouge, LA. Infected leaves showed chlorotic lesions on the adaxial surface and were associated with scattered, hypophyllous uredinia. Urediniospores were globose to obovoid, echinulate, had two equatorial germ pores, and measured 16 to 21 × 18 to 25 μm with a wall 2 μm thick. Telia and teliospores were not observed on any of the collected samples. The pathogen was identified as Uromyces plumbarius Peck on the basis of the uredinial characters compared with four U.S. National Fungus (BPI 1103868, 0013551, 0013554, and 0013557) collections of U. plumbarius. The three collections from Louisiana have been deposited in the Bernard Lowy Mycological Herbarium. DNA was extracted from all three specimens and the nuclear ribosomal large subunit (28S) was amplified according to the protocol outlined by Aime (1). The three Louisiana collections had identical large subunit sequences (GenBank Accession Nos. JQ312670, JQ312671, and JQ312672). No sequences of U. plumbarius were available for comparison in GenBank; a BLAST search was 99% similar over 100% query coverage to Puccinia dioicae Magnus (Accession No. GU058019) and P. silvatica J. Schröt. (Accession No. AY222048). The uredinial/telial hosts of P. dioicae and P. silvatica are in the Cyperaceae, whereas U. plumbarius is an autoecious rust on Onagraceae. It is interesting to note that the aecial stage of P. dioicae occurs on Onagraceae and that it has a high sequence identity to U. plumbarius, supporting the hypothesis that these are correlated species (2). U. plumbarius has been recorded on several species of Gaura within the United States. To our knowledge, this is the first record of U. plumbarius in Louisiana and the first report of U. plumbarius on G. lindheimeri. References: (1) M. C. Aime. Mycoscience 47:112, 2006. (2) C. R. Orton. Mycologia 4:194, 1912.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Chauhan, Ravendra P., Ronen Fogel y Janice Limson. "Nanopore MinION Sequencing Generates a White Spot Syndrome Virus Genome from a Pooled Cloacal Swab Sample of Domestic Chickens in South Africa". Microorganisms 11, n.º 11 (18 de noviembre de 2023): 2802. http://dx.doi.org/10.3390/microorganisms11112802.

Texto completo
Resumen
White spot syndrome virus is a highly contagious pathogen affecting shrimp farming worldwide. The host range of this virus is primarily limited to crustaceans, such as shrimps, crabs, prawns, crayfish, and lobsters; however, several species of non-crustaceans, including aquatic insects, piscivorous birds, and molluscs may serve as the vectors for ecological dissemination. The present study was aimed at studying the faecal virome of domestic chickens (Gallus gallus domesticus) in Makhanda, Eastern Cape, South Africa. The cloacal swab specimens (n = 35) were collected from domestic chickens in December 2022. The cloacal swab specimens were pooled—each pool containing five cloacal swabs—for metagenomic analysis using a sequence-independent single-primer amplification protocol, followed by Nanopore MinION sequencing. While the metagenomic sequencing generated several contigs aligning with reference genomes of animal viruses, one striking observation was the presence of a White spot syndrome virus genome in one pool of cloacal swab specimens. The generated White spot syndrome virus genome was 273,795 bp in size with 88.5% genome coverage and shared 99.94% nucleotide sequence identity with a reference genome reported in China during 2018 (GenBank accession: NC_003225.3). The Neighbour-Joining tree grouped South African White spot syndrome virus genome with other White spot syndrome virus genomes reported from South East Asia. To our knowledge, this is the first report of a White spot syndrome virus genome generated from domestic chickens. The significance of White spot syndrome virus infection in domestic chickens is yet to be determined.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Bianco, L. F., E. C. Martins, R. S. Toloy, D. A. B. Coletti, D. C. Teixeira y N. A. Wulff. "First Report of Phytoplasmas Groups 16SrI and 16SrXV in Crotalaria juncea in Brazil". Plant Disease 98, n.º 7 (julio de 2014): 990. http://dx.doi.org/10.1094/pdis-11-13-1190-pdn.

Texto completo
Resumen
Sunn hemp (Crotalaria juncea L., Fabaceae) is widely used as a cover crop in sugar cane and citrus plantations in Brazil. C. juncea has been reported in São Paulo State (SPS) by Wulff et al. (3) as a host of the phytoplasma associated with symptoms of huanglongbing (HLB) in citrus, a member of group 16SrIX, that induces witches'-broom in sunn hemp (3). In studying the distribution of group 16SrIX phytoplasma in C. juncea in SPS, we identified this species as a new host of two phytoplasmas. Sunn hemp fields were inspected for symptoms usually associated with phytoplasma infections, such as leaf yellowing, shoot proliferation, witches'-brooms, and virescence. Ninety-nine plant samples were collected and DNA was extracted with the CTAB protocol from stems. Nested PCR was carried out with primers P1/P7, followed by amplification with primers fU3/rU5 (2), both sets being universal for phytoplasma. Asymptomatic sunn hemp samples were used as negative controls and were negative in PCR reactions. PCR products were directly sequenced with primers P1/P7 and fU3/rU5 and phytoplasma identification was conducted with BLASTn and in silico RFLP analysis for delineation of subgroups (4). Plants showing leaf yellowing (three plants; Catanduva County), shoot proliferation (one plant; Ibirá County), or witches'-brooms (one plant; Promissão County) symptoms were found to be infected with the 16SrI phytoplasma group, subgroup S. The 16S rDNA sequence (GenBank Accession No. KF878383) showed 99% identity (E value 0.0) with Candidatus Phytoplasma asteris, Onion yellows phytoplasma OY-M (AP006628), Mulberry yellow dwarf phytoplasma (GQ249410), and Ash witches'-broom phytoplasma (AY566302), among other phytoplasmas from the same group. Sunn hemp plants with shoot proliferation (three plants) carried the 16SrXV phytoplasma group, subgroup A, found in Ibirá (two plants) and Catanduva (one plant) counties, SPS. This sequence (GenBank Accession No. KF878382) displayed 99% identity (E value 0.0) with Ca. P. brasiliense, Hibiscus witches'-broom phytoplasma (AF147708), Guazuma ulmifolia witches'-broom phytoplasma (HQ258882, HQ258883), and Cauliflower stunt phytoplasma (JN818845). Both phytoplasma groups described in this report, 16SrI and 16SrXV, were collected in May 2010 and both have limited geographic distribution and occurred at low incidence. Phytoplasma of group 16SrI (Ca. P. asteris) was identified in C. spectabilis in India (1). To our knowledge, this is the first report of phytoplasmas groups 16SrI and 16SrXV in sunn hemp. References: (1) S. Kumar et al. Plant Dis. 94:1265, 2010. (2) E. Seemüller et al. Int. J. Syst. Bacteriol. 44:440, 1994. (3) N. A. Wulff et al. Tropical Plant Pathol. 34:S7, 2009. (4) Y. Zhao et al. Int. J. Syst. Evol. Microbiol. 59:2582, 2009.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Antonia, Alejandro L., Liuyang Wang y Dennis C. Ko. "A real-time PCR assay for quantification of parasite burden in murine models of leishmaniasis". PeerJ 6 (9 de noviembre de 2018): e5905. http://dx.doi.org/10.7717/peerj.5905.

Texto completo
Resumen
Eukaryotic parasites in the genusLeishmaniaplace approximately 350 million people per year at risk of disease. In addition to their global health significance,Leishmaniaspp. have served as an important model for delineating basic concepts in immunology such as T-helper cell polarization. There have been many qPCR-based assays reported for measuring parasite burden in humans and animals. However, these are largely optimized for use in clinical diagnosis and not specifically for animal models. This has led several of these assays to have suboptimal characteristics for use in animal models. For example, multi-copy number genes have been frequently used to increase sensitivity but are subject to greater plasticity within the genome and thus may confound effects of experimental manipulations in animal models. In this study, we developed a sybr-green based quantitative touchdown PCR assay for a highly conserved and single-copy putative RNA-binding protein, DRBD3. With primers that share greater than 90% sequence identity across all sequencedLeishmaniaspp., we demonstrate that this assay has a lower limit of detection of 100 fg of parasite DNA forLeishmania major,L. donovani,L. venezuelensis, andL. panamensis. Using C57BL6/J mice, we used this assay to monitor parasite burden over 1 month of infection with two strains ofL. major(Seidman and Friedlin), andL. venezeuelensis.These characteristics rival the sensitivity of previously reported qPCR based methods of parasite quantitation while amplifying a stable, single copy gene. Use of this protocol in the future will lead to improved accuracy in animal based models and help to tease apart differences in biology of host-parasite interactions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Wittke, Vanessa, Harald Binder, Stefan Zimmermann, Dietmar Pfeifer, Martin Schumacher, Juergen Finke y Hendrik Veelken. "SELDI-TOF-Based Proteomic Analysis of Plasma Samples as a Diagnostic Tool to Predict Acute Graft-Versus-Host Disease after Allogeneic Stem Cell Transplantation". Blood 112, n.º 11 (16 de noviembre de 2008): 1165. http://dx.doi.org/10.1182/blood.v112.11.1165.1165.

Texto completo
Resumen
Abstract Allogeneic hematopoietic stem cell transplantation (SCT) offers a curative treatment option for high-risk hematological tumors. Graft-versus-host disease (GvHD) is a severe and potentially life-threatening complication of allogeneic SCT. GvHD is caused by the activation of transplanted alloreactive T-cells and results in severe inflammation of host tissues in skin, liver, and gastrointestinal tract. Manifest GvHD can be diagnosed by clinical criteria and histology only. So far, no diagnostic blood test is able to detect imminent GvHD. GvHD is prevented and treated by systemic immunosuppression which is associated with opportunistic infections and higher relapse rates. Therefore, reliable detection of incipient GvHD would allow to investigate preemptive immunosuppressive therapy tailored to individual patients at appropriate time points. Proteomic profiling is based on the premise that alterations related to pathological states (e.g., GvHD) are accompanied by quantitative and qualitative alterations in plasma protein profiles. The surface-enhanced laser desorption/ionization (SELDI) technology relies on time-of-flight mass spectrometry for accurate measurement of the mass-to-charge ratio (m/z) of proteins that have been preselected on appropriate functional surfaces. We conducted a prospective case-control study based on >3000 serial plasma samples of 236 consecutive patients undergoing allogeneic SCT. 43 patients developed acute GvHD grade I-IV during their sampling period and were matched to control patients remaining GvHD-free. Matching criteria were prior antithymocyte globulin treatment, donor type (related versus unrelated), conditioning protocol, remission status at SCT, diagnosis, age, and sex. These factors were ranked in the listed order. Plasma protein patterns were obtained by SELDI-TOF on day -2 prior to the onset of clinical GvHD and compared to 43 plasma samples obtained on the corresponding day after SCT from the matched GvHD-free patients. In order to enhance the number of analyzable proteins, plasma samples were fractionated to yield 5 different sets of SELDI spectra. Protein peak positions and calibrated peak heights were determined according to Yasui et al (J Biomed Biotechnol, 2003). To identify a limited number of predictive peaks, a sparse logistic regression model was fitted by a boosting approach (Tutz & Binder, Computational Statistics & Data Analysis, 2007), resulting in 4 peaks at 11963, 22363, 22479, and 30977 Da. Prediction performance of a signature derived from this approach on new data was evaluated using bootstrap samples, resulting in an estimated misclassification rate of 38.5%, an estimated sensitivity of 61.0%, and specificity of 60.5% In addition, the identified predictive peaks could be recovered in most bootstrap samples, indicating sufficient stability of the signature. While the performance of this assay strategy is insufficient for use in clinical practice at present, our data nevertheless demonstrate the potential of proteomic plasma analysis in combination with a tailored statistical analysis to identify GvHD prior to its clinically recognizable onset. In contrast to the clinical routine of immunosuppressive GvHD prophylaxis for all patients after allogeneic SCT with treatment escalation in the case of clinically relevant GvHD, this diagnostic tool therefore offers the perspective for preemptive GvHD therapy administered only to patients with an imminent GvH reaction. Such a tailored GvHD strategy may represent a cornerstone to reduce the risk of infectious complications and tumor relapse while maintaining effective GvHD control in patients at risk. Current work addresses the identity of the index peaks, the temporal evolution of the signature, and refinement of the proteomic analysis.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Viršček Marn, M. y I. Mavrič Pleško. "First Report of Tomato chlorotic dwarf viroid in Petunia spp. in Slovenia". Plant Disease 94, n.º 9 (septiembre de 2010): 1171. http://dx.doi.org/10.1094/pdis-94-9-1171b.

Texto completo
Resumen
In early April 2010, 30 samples of Petunia spp. were taken by phytosanitary inspectors from 22 production sites in Slovenia in the frame of surveying host plants for the presence of Potato spindle tuber viroid (PSTVd). Samples were taken in accordance with the plan of the survey for the year 2010 and were tested for the presence of PSTVd by real-time RT-PCR according to the EPPO protocol (1). At the time of sampling, there were no disease symptoms on the plants. Samples consisted of fully developed leaves collected from as many as five plants. Total RNA was isolated from 50 ± 5 mg of leaf tissue with an RNeasy Plant Mini Kit (Qiagen, Chatsworth, CA). One sample of cv. Surfinia Purple from a production site from the coastal region and another of cv. Surfinia Hot Pink 05 from a production site near Ljubljana, both multiplied through cuttings, were positive by real-time RT-PCR, confirming the presence of PSTVd or Tomato chlorotic dwarf viroid (TCDVd). To identify the viroid, RT-PCR with primer pairs of Shamloul et al. (3) and Di Serio (2) were performed with isolated total RNA of each positive sample. RT-PCR products were obtained only with primer pairs of Shamloul et al. (3). To obtain the full sequence, additional RT-PCR was done for each sample with semi-universal pospiviroid primers Vid-RE/FW (4). RT-PCR products obtained with primer pair of Shamloul et al. (3) and primer pair Vid RE/FW were sequenced (Macrogen, Seoul, Korea). Sequence analysis confirmed the identity of a viroid as TCDVd. Both isolates consisted of 360 nucleotides and were 100% identical to an isolate from tomato deposited in NCBI GenBank under Accession No. AF162131. They showed 98% identity with sequences from petunias (GQ396664, EF582392, EF582393, and DQ859013). The infected Petunia spp. stocks were destroyed. Although the infection of Petunia spp. with TCDVd is symptomless, the infected plants could be a source of infection for tomato and potato. TCDVd infection can cause severe damage on potato and tomato, similar to that caused by infection with PSTVd, to which it is closely related. To our knowledge this is the first finding of TCDVd in Petunia spp. in Slovenia. References: (1) Anonymous. EPPO Bull. 34:257, 2004. (2) F. Di Serio. J. Plant Pathol. 89:297, 2007. (3) A. M. Shamloul et al. Can. J. Plant Pathol. 19:89, 1997. (4) J. Th. J. Verhoeven et al. Eur. J. Plant Pathol. 110:823, 2004.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Nirwan, Figur Muhammad Ali Putra, Josina Augustina Yvonne Wattimena y Arman Anwar. "Bentuk Pertanggungjawaban Pelanggaran Ham Terhadap Tawanan Perang Menurut Hukum Dan Ham Internasional". TATOHI: Jurnal Ilmu Hukum 3, n.º 7 (23 de octubre de 2023): 632. http://dx.doi.org/10.47268/tatohi.v3i7.1849.

Texto completo
Resumen
Introduction: The Syrian conflict was motivated by the Arab Spring, which was related to demonstrations and popular resistance in the Middle East and North Africa which ended with the fall of the ruling regimes in these regional countries.Purposes of the Research: The research method uses a normative juridical method. This type of research is descriptive analytical using primary, secondary and tertiary sources of legal materials where the collection of legal materials is carried out using library research. Furthermore, the analysis technique uses qualitative analysis, by identifying facts, eliminating irrelevant things, determining the issue and then concluding the results of the analysis according to the problem being studied.Methods of the Research: The research method uses a normative juridical method. This type of research is descriptive analytical using primary, secondary and tertiary sources of legal materials where the collection of legal materials is carried out using library research. Furthermore, the analysis technique uses qualitative analysis, by identifying facts, eliminating irrelevant things, determining the issue and then concluding the results of the analysis according to the problem being studied.Results of the Research: Legal violations against prisoners of war based on international legal and human rights instruments according to the Geneva Convention III of 1949 (Geneva Convention (III) Relative to the Treatment of Prisoners of Wat) and Additional Protocol I year 1977 (Protocol Additional to the Geneva Conventions of 12August 1949, and relating to the Protection of Victims of international Armed Conflicts) have the right to be treated with dignity and humanity, such as not being forced to provide information unless they know their identity. Their torture and cruel treatment is seen as a war crime. prisoners of war must be moved from dangerous areas to safe places. Their living conditions must be equivalent to those of members of the armed forces of the host nation. Accountability for legal violations against prisoners for serious human rights violations against prisoners of war legally basically refers to the principle of exhaustion of local remedies through the mechanism of a national court forum. The unwillingness and inability of countries suspected of committing serious violations of human rights to resolve the problem of these violations at the national level can underlie the emergence of the judicial competence of the International Criminal Court (ICC). War crimes and crimes against humanity in accordance with the Rome Statute (Article 5 paragraph (1).
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Li, Y. P., D. G. Wright, V. Lanoiselet, C. P. Wang, N. Eyres, D. Real, M. P. You y M. J. Barbetti. "First Report of Phoma herbarum on Tedera (Bituminaria bituminosa var. albomarginata) in Australia". Plant Disease 96, n.º 5 (mayo de 2012): 769. http://dx.doi.org/10.1094/pdis-12-11-1040-pdn.

Texto completo
Resumen
Tedera (Bituminaria bituminosa (L.) C.H. Stirton var. albomarginata) has been successfully established across the mixed-farming (wheat-sheep) region of Western Australia because this species has remarkable drought tolerance and can survive the dry-summer period with strong retention of green leaf. A leaf spot symptom involving pale brown lesions with distinct dark brown margins had been observed in genetic evaluation plots of tedera at Medina and Mount Barker, Western Australia, and a Phoma sp. was isolated. Single-spore isolations of a typical Phoma sp. isolate were made onto potato dextrose agar and maintained at 20°C, and a representative culture has been lodged in the Western Australian Culture Collection Herbarium maintained at the Department of Agriculture and Food Western Australia (Accession No. WAC13435). Amplification of the internal transcribed spacer (ITS) 1 and ITS2 regions flanking the 5.8S rRNA gene were carried out with universal primers ITS1 and ITS4 according to published protocol (3). The DNA PCR products were sequenced and BLAST analyses was used to compare sequences with those in GenBank. The sequence had 99% nucleotide identity with the corresponding sequence in GenBank for Phoma herbarum. Isolates also showed morphological (e.g., 1) and molecular (e.g., 2) similarities with P. herbarum as described in other reports. The relevant sequence information for a representative isolate has been lodged in GenBank (Accession No. JQ282910). A conidial suspension of 107 conidia ml–1 from a single-spore culture was spray inoculated onto foliage of 6-week-old tedera plants maintained under >90% relative humidity conditions for 72-h postinoculation. Symptoms evident by 10 days postinoculation consisted of pale brown lesions, mostly 1.5 to 4 mm in diameter, which developed a distinct, dark brown margin. Occasional lesions also showed a distinct chlorotic halo extending 1 to 1.5 mm outside the boundary of the lesion. Infection studies were successfully repeated twice and P. herbarum was readily reisolated from infected foliage. No disease was observed on and no P. herbarum were isolated from water-inoculated control plants. Except for a recent published report of P. herbarum on field pea (Pisum sativum L.) (2), this pathogen has only been noted in the Australian Plant Pest Database as occurring on lucerne (Medicago sativa L.) and soybean (Glycine max (L.) Merr.) in Western Australia in 1985 and on a Protea sp. in 1991. To our knowledge, this is the first published report of P. herbarum as a pathogen on tedera in Australia or elsewhere. That P. herbarum occurs on other hosts in Australia and has a wide host range elsewhere together suggest its potential to be a pathogen on a wider range of host genera and species. References: (1) G. L. Kinsey. No. 1501 in: IMI Descriptions of Fungi and Bacteria. 2002. (2) Y. P. Li et al. Plant Dis. 95:1590, 2011. (3) T. J. White et al. Page 315 in: PCR Protocols: A Guide to Methods and Applications. Academic Press, San Diego, CA, 1990.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Demissie, Yohannes, Christèle Humblot, Bridget Baxter, Nora Jean Nealon y Elizabeth Ryan. "Probiotic Fermentation of Rice Bran with Six Genetically Diverse Strains Effects Nutrient and Phytochemical Composition; a Non-Targeted Metabolomics Approach". Current Developments in Nutrition 4, Supplement_2 (29 de mayo de 2020): 1553. http://dx.doi.org/10.1093/cdn/nzaa062_010.

Texto completo
Resumen
Abstract Objectives This study examined the contributions of native gut probiotic bacteria in production of rice bran microbial metabolites with bioactivity and nutritional importance. The study hypothesize that bacteria and yeast probiotics utilize distinct genes for bidirectional influence on bacterial cross feeding and host bioavailability of rice bran vitamins, while decreasing undesirable molecules. Methods A one/two step fermentation protocol was applied to rice bran (RBT-300) with the following strains Lactobacillus fermentum ATCC 23271, L. paracasei ATCC 21052_R1, L. rhamnosus GG, Escherichia coli Nissle 1917, and Bifidobacterium longum ATCC 55813 before and after incubation with yeast probiotic Saccharomyces boulardii. Metabolomic analysis was performed following 80% methanol-water under vigorous shaking (2 min) followed by centrifugation to remove proteins. Extracts were applied to reverse phase (RP)/UPLC-MS/MS methods with positive and negative ion mode electrospray ionization. Results The rice bran metabolite profile in the presence of fermentation yielded 613 unique biochemical compounds of known identity across 8 major chemical classes. The bacterial strains used alone or after yeast fermentation modified about 70% of the metabolome and 60% total vitamins. For instance, vitamin B6 changed by strain L. rhamnosus GG (increased fivefold) when compared to rice bran, and supports the role for bacterial gene/enzyme in increased production. Findings were supported by decreased metabolite precursor. Phytate degradation persisted across this cocktail of probiotics that can further enhance nutrient bioavailability. Conclusions The metabolomics approach for fermented rice bran analysis allows for information across other diverse pathways including protein, lipids, prebiotics and phenolics. The inclusion of the probiotics genetic potential and diversity are criteria for rice bran fermentation that merit continued attention for its functional impact on gut health and immunity. Funding Sources National Institutes of Health-National Cancer Institute (3R01CA201112-04S1).
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Wegener, L. A., Z. K. Punja y R. R. Martin. "First Report of Blueberry scorch virus in Black Huckleberry in British Columbia". Plant Disease 91, n.º 3 (marzo de 2007): 328. http://dx.doi.org/10.1094/pdis-91-3-0328c.

Texto completo
Resumen
Blueberry scorch virus (BlScV), an aphid-borne carlavirus, causes a serious disease of highbush blueberry (Vaccinium corymbosum L.) in North America and Europe. Symptoms of BlScV infection on highbush blueberry include necrosis of flower blossoms and young leaves, shoot blight, and chlorosis. Currently, cranberry (Vaccinium macrocarpon L.) is the only other natural host of BlScV. In July 2004, wild black huckleberry (Vaccinium membranaceumL.) was sampled in the Kootenay Region of southeastern British Columbia. Foliar tissues were sampled during 2004 from 11 bushes from a clearing on the side of a mountain near Crawford Bay, BC, Canada and tested by double-antibody sandwich-ELISA using polyclonal antiserum (Agdia Inc., Elkhart, IN). BlScV was detected in 6 of the 11 bushes sampled and in the positive control (BlScV-infected blueberry leaf tissue) and was not detected in the negative control (healthy blueberry leaf tissue). To confirm the presence of the virus, total nucleic acid was extracted from ELISA-positive huckleberry samples according to an established protocol (A. Rowhani et al. Proc. Int. Counc. Stud. Viruses Virus-Like Dis. Grapevine, Extended Abstr. 13:148, 2000). Reverse transcription-PCR was performed using pd(T)12-18 random primer (Amersham Biosciences, Piscataway, NJ) for reverse transcription and BlScV-specific primers developed against the published NJ-2 sequence of BlScV (GenBank Accession No. NC_003499). Using the forward primer, BS708F, (5′-TCAATCCGTGGTGCTACGAG-3′), and the reverse primer, BS1188R, (5′-ACAGTGCGCAATGTTCCAGT-3′), a 480-bp amplicon was obtained from each of the ELISA-positive samples, while no ampli-cons were observed for the negative control (ELISA-negative huckleberry tissue). Direct sequencing of one selected amplicon revealed 90, 84, and 77% nucleotide sequence identity and 97, 96, and 88% amino acid sequence identity with strains NJ-2, BC-1 (GenBank Accession No. AY941198) and BC-2 (GenBank Accession Nos. AY941199), respectively. BlScV-infected huckleberries were asymptomatic. The presence of BlScV in alternate hosts has implications for disease epidemiology. Testing for BlScV in Vaccinium species in and around commercial highbush blueberry plantings, as well as lowbush blueberry (V. angustifolium Aiton), rabbiteye blueberry (V. ashei Reade), other native Pacific Northwest species (V. ovatum Pursh and V. parvifolium Smith), and ornamental Vaccinium species is warranted. To our knowledge, this is the first report of BlScV infecting black huckleberry.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Bhunjun, Chitrabhanu S., Alan J. L. Phillips, Ruvishika S. Jayawardena, Itthayakorn Promputtha y Kevin D. Hyde. "Importance of Molecular Data to Identify Fungal Plant Pathogens and Guidelines for Pathogenicity Testing Based on Koch’s Postulates". Pathogens 10, n.º 9 (28 de agosto de 2021): 1096. http://dx.doi.org/10.3390/pathogens10091096.

Texto completo
Resumen
Fungi are an essential component of any ecosystem, but they can also cause mild and severe plant diseases. Plant diseases are caused by a wide array of fungal groups that affect a diverse range of hosts with different tissue specificities. Fungi were previously named based only on morphology and, in many cases, host association, which has led to superfluous species names and synonyms. Morphology-based identification represents an important method for genus level identification and molecular data are important to accurately identify species. Accurate identification of fungal pathogens is vital as the scientific name links the knowledge concerning a species including the biology, host range, distribution, and potential risk of the pathogen, which are vital for effective control measures. Thus, in the modern era, a polyphasic approach is recommended when identifying fungal pathogens. It is also important to determine if the organism is capable of causing host damage, which usually relies on the application of Koch’s postulates for fungal plant pathogens. The importance and the challenges of applying Koch’s postulates are discussed. Bradford Hill criteria, which are generally used in establishing the cause of human disease, are briefly introduced. We provide guidelines for pathogenicity testing based on the implementation of modified Koch’s postulates incorporating biological gradient, consistency, and plausibility criteria from Bradford Hill. We provide a set of protocols for fungal pathogenicity testing along with a severity score guide, which takes into consideration the depth of lesions. The application of a standard protocol for fungal pathogenicity testing and disease assessment in plants will enable inter-studies comparison, thus improving accuracy. When introducing novel plant pathogenic fungal species without proving the taxon is the causal agent using Koch’s postulates, we advise the use of the term associated with the “disease symptoms” of “the host plant”. Where possible, details of disease symptoms should be clearly articulated.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Jones, Rhys Aled, Chelsea N. Davis, Dewi Llyr Jones, Fiona Tyson, Emma Davies, David Cutress, Peter M. Brophy, Michael T. Rose, Manod Williams y Hefin Wyn Williams. "Temporal dynamics of trematode intermediate snail host environmental DNA in small water body habitats". Parasitology 148, n.º 12 (30 de junio de 2021): 1490–96. http://dx.doi.org/10.1017/s0031182021001104.

Texto completo
Resumen
AbstractEnvironmental DNA (eDNA) surveying has potential to become a powerful tool for sustainable parasite control. As trematode parasites require an intermediate snail host that is often aquatic or amphibious to fulfil their lifecycle, water-based eDNA analyses can be used to screen habitats for the presence of snail hosts and identify trematode infection risk areas. The aim of this study was to identify climatic and environmental factors associated with the detection of Galba truncatula eDNA. Fourteen potential G. truncatula habitats on two farms were surveyed over a 9-month period, with eDNA detected using a filter capture, extraction and PCR protocol with data analysed using a generalized estimation equation. The probability of detecting G. truncatula eDNA increased in habitats where snails were visually detected, as temperature increased, and as water pH decreased (P < 0.05). Rainfall was positively associated with eDNA detection in watercourse habitats on farm A, but negatively associated with eDNA detection in watercourse habitats on farm B (P < 0.001), which may be explained by differences in watercourse gradient. This study is the first to identify factors associated with trematode intermediate snail host eDNA detection. These factors should be considered in standardized protocols to evaluate the results of future eDNA surveys.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Dong, Yuran, Xinqiang Xi, Hanxiang Chen, Yangheshan Yang y Shucun Sun. "A Protocol to Identify the Host of Parasitoids by DNA Barcoding of Vestigial Tissues". Annales Zoologici Fennici 57, n.º 1-6 (14 de mayo de 2020): 11. http://dx.doi.org/10.5735/086.057.0102.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Nischwitz, C., S. W. Mullis, R. D. Gitaitis y A. S. Csinos. "First Report of Tomato spotted wilt virus in Soybean (Glycine max) in Georgia". Plant Disease 90, n.º 4 (abril de 2006): 524. http://dx.doi.org/10.1094/pd-90-0524b.

Texto completo
Resumen
Tomato spotted wilt virus (TSWV) is a member of the family Bunyaviridae and has a wide host range including important crops such as tomato, pepper, tobacco, peanut, and onion. In areas of Georgia, soybean (Glycine max) is double cropped between two onion crops and as a rotation crop with peanuts. Soybeans do not show any TSWV symptoms, and therefore, have not been tested on a large scale for the virus. However, because symptomless weed and crop plants provide a reservoir for TSWV and the thrips vectors (2), a survey was conducted during the summer of 2005 to evaluate the occurrence of TSWV in soybean. The survey took place in seven counties in southern Georgia with field sizes ranging between 0.4 and 20 ha (1 and 50 acres). Soybean cultivars included Haskell, DP7220, DP6770, Pioneer 97B52, and Vigoro V622NRR. Of 848 randomly selected plants tested using the double-antibody sandwich enzyme-linked immunosorbent assay (DAS-ELISA) (Agdia, Inc., Elkhart, IN), 6.6% tested positive for TSWV. Plants testing positive ranged from seedling to the pod-setting stages. Leaves and roots of several plants tested positive, indicating a systemic infection. Soybean plants testing positive using ELISA were blotted onto FTA cards (Whatman Inc., Brentford, UK) to bind viral RNA for preservation, and the blotted samples were processed according to the manufacturer's protocol. Reverse transcription-polymerase chain reaction using punch-outs from the FTA cards and TSWV nucleocapsid gene specific forward and reverse primers (5′-TTAAGCAAGTTCTGTGAG-3′ and 5′-ATGTCTAAGGTTAAGCTC-3′), respectively (4), confirmed the identity of TSWV. TSWV has been found in soybean in other parts of the world (1) but has only been reported in the United States in a survey from Tennessee (3). To our knowledge, this is the first report of the occurrence of TSWV in soybean in Georgia. The role soybean plays as a reservoir or green bridge for thrips and TSWV is currently unknown. References: (1) A. R. Golnaraghi et al. Plant Dis. 88:1069, 2004. (2) R. L. Groves et al. Phytopathology 91:891, 2001. (3) B. S. Kennedy and B. B. Reddick. Soybean Genet. Newsl. 22:197, 1995. (4) H. R. Pappu et al. Tob. Sci. 40:74, 1996.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Robertson, N. L., K. L. Brown, L. M. Winton y P. S. Holloway. "First Report of Tobacco rattle virus in Peony in Alaska". Plant Disease 93, n.º 6 (junio de 2009): 675. http://dx.doi.org/10.1094/pdis-93-6-0675b.

Texto completo
Resumen
Peonies (Paeonia sp.) are highly valued for their large showy flowers in home gardens and commercially in the cut flower industry. In 2007, scattered peony (Paeonia lactiflora ‘Sarah Bernhardt’) plants cultivated on small plots at the University of Alaska Experimental Station in Fairbanks displayed distinct leaf ringspot patterns. Symptoms were more severe during the cooler months of the growing season (June and September), with symptom remission in the intervening warmer months. Leaf samples from six symptomatic plants were collected in July and from 20 symptomatic plants in September and assayed for viruses. Leaf samples (1 g) were assayed with a general protocol for plant virus extraction and partial purification with differential centrifugation followed by protein detection on stained sodium dodecyl sulfate-polyacrylamide gel electrophoresis (1). No distinct proteins indicative of viral coat protein(s) were detected. Tomato spotted wilt virus (TSWV) and Tobacco rattle virus (TRV), known pathogens of peony, were then specifically targeted. Total RNA was extracted from each sample with an RNeasy Plant Mini kit (Qiagen Inc., Valencia, CA) and used as the template for reverse transcription (RT)-PCR with random primers. TSWV was not detected by RT-PCR with tospovirus group-specific primers (Agdia, Inc., Elkhart, IN). A nested set of primers designed from the TRV 16-kDa protein gene on RNA1 (4) amplified an ~600-bp fragment from one of the symptomatic plants. This DNA was directly sequenced (GenBank Accession No. FJ357572) and BLAST searches in GenBank revealed as much as 95% nucleotide (nt) identity with TRV accessions J04347 and X03685. Additional primer pairs specific for TRV (2) amplified overlapping fragments with expected sizes of ~818, ~515, and ~290 bp from the 29- and 16-kDa protein genes on the 3′-end of RNA1 that were directly sequenced. Assembly of these sequences in Sequencher 4.8 (Gene Codes Corp., Ann Arbor, MI) resulted in a 1,422-nt sequence (Accession No. FJ357571) and Clustal X analysis (3) showed 93 to 94% nt identity to TRV isolates, -ORY (AF034622), -PpK20 (AF314165), -Pp085 (AJ586803), and -SYM (D00155). Mechanical inoculation of partially purified virions from the confirmed TRV-infected peony plant to Nicotiana benthamiana gave no symptoms to occasional ringspots, faintly curled leaves, and chlorotic blotches on N. tabacum ‘Samsun’, and local lesions on Chenopodium amaranticolor. TRV infection of these hosts was confirmed by RT-PCR. With electron microscopy, rod-shaped particles similar to TRV with a distinct central canal characteristic of TRV were seen occasionally only from inoculated N. benthamiana. On the basis of the biological and molecular data, we have determined the virus in the peony to be an isolate of TRV, tentatively named TRV-Peony. TRV was confirmed in only one other peony based on a sequenced 290-nt PCR fragment with 95% identity with the sequence from the other TRV-infected peony. Lack of TRV detection in the other symptomatic peonies was possibly due to low viral concentrations and interfering plant substances. Documentation of TRV in peonies is especially important to help avoid distribution of virus-infected vegetative propagation material. To our knowledge, this is the first report of TRV in this host in Alaska, but also of this virus in Alaska. References: (1) L. C. Lane. Methods Enzymol. 118:687, 1986. (2) D. J. Robinson. J. Phytopathol. 152:286, 2004. (3) J. D. Thompson et al. Nucleic Acids Res. 24:4882, 1997. (4) F. Van Der Wilk et al. Eur. J. Plant Pathol.100:109, 1994.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Drzewnioková, Petra, Francesca Festa, Valentina Panzarin, Davide Lelli, Ana Moreno, Barbara Zecchin, Paola De Benedictis y Stefania Leopardi. "Best Molecular Tools to Investigate Coronavirus Diversity in Mammals: A Comparison". Viruses 13, n.º 10 (1 de octubre de 2021): 1975. http://dx.doi.org/10.3390/v13101975.

Texto completo
Resumen
Coronaviruses (CoVs) are widespread and highly diversified in wildlife and domestic mammals and can emerge as zoonotic or epizootic pathogens and consequently host shift from these reservoirs, highlighting the importance of veterinary surveillance. All genera can be found in mammals, with α and β showing the highest frequency and diversification. The aims of this study were to review the literature for features of CoV surveillance in animals, to test widely used molecular protocols, and to identify the most effective one in terms of spectrum and sensitivity. We combined a literature review with analyses in silico and in vitro using viral strains and archive field samples. We found that most protocols defined as pan-coronavirus are strongly biased towards α- and β-CoVs and show medium-low sensitivity. The best results were observed using our new protocol, showing LoD 100 PFU/mL for SARS-CoV-2, 50 TCID50/mL for CaCoV, 0.39 TCID50/mL for BoCoV, and 9 ± 1 log2 ×10−5 HA for IBV. The protocol successfully confirmed the positivity for a broad range of CoVs in 30/30 field samples. Our study points out that pan-CoV surveillance in mammals could be strongly improved in sensitivity and spectrum and propose the application of a new RT-PCR assay, which is able to detect CoVs from all four genera, with an optimal sensitivity for α-, β-, and γ-.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Kuczera, Konrad, Anna Orłowska, Marcin Smreczak, Maciej Frant, Paweł Trębas y Jerzy Rola. "Prevalence of Astroviruses in Different Animal Species in Poland". Viruses 16, n.º 1 (4 de enero de 2024): 80. http://dx.doi.org/10.3390/v16010080.

Texto completo
Resumen
Astroviruses (AstVs) are small RNA viruses characterized by a high mutation rate, the ability to recombine, and interspecies transmission, which allows them to infect a multitude of hosts including humans, companion animals, and farmed animals as well as wildlife. AstVs are stable in the environment, and their transmission is usually through the fecal–oral route or via contaminated water and food. Although direct zoonotic transmission was not confirmed, interspecies transmission events have occurred or have been indicated to occur in the past between wild and domestic animals and humans. They cause large economic losses, mainly in the poultry sector, due to gastroenteritis and mortality. In young children, they are the second most common cause of diarrhea. This study involved 166 intestine samples and pools of spleen, lymph node, and kidney samples collected from 352 wild animals, 52 pigs, and 31 companion animals. Astroviruses were detected in the intestine samples and were separately detected in pools of tissue samples prepared for individual animals using a heminested RT-PCR protocol. Amplicons were subjected to Sanger sequencing, and a phylogenetic analysis of 320 nt RNA-dependent RNA polymerase (RdRp) fragments referring to known nt sequences of astroviruses was performed. Astroviral RNA was detected in the intestine samples and/or tissue pools of red foxes (nine positive intestines and six positive tissue pools), rats (two positive intestines and three positive tissue pools), a cat (one AstV detected in an intestine sample), pigs (eight positive tissue pools), and wild boars (two positive pools of spleens, kidneys, and lymph nodes). No astroviral RNA was detected in wild mustelids, dogs, or other small wild animals including rodents. A phylogenetic analysis revealed that the astroviruses detected during this study were mostly host-specific, such as porcine, canine, and rat astroviruses that were highly homologous to the sequences of reference strains. In one of two wild boars, an AstV distinct to porcine species was found with the highest nt identity to Avastroviruses, i.e., turkey astroviruses, which suggests potential cross-species transmission of the virus, as previously described. Here, we present the first detection of astroviruses in the population of wild animals, companion animals, and pigs in Poland, confirming that astroviruses are frequent pathogens circulating in animals in the field. Our study also suggests potential cross-species transmission of Avaastrovirus to wild boars; however, further molecular characterization is needed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Abbaszadegan, M., P. Ghatpande, J. Brereton, A. Alum y R. Narasimhan. "Laboratory testing protocol to identify critical factors in bacterial compliance monitoring". Water Science and Technology 47, n.º 3 (1 de febrero de 2003): 131–36. http://dx.doi.org/10.2166/wst.2003.0181.

Texto completo
Resumen
This research focused on providing guidelines for water utilities on the collection and handling of routine bacteriological samples and in developing scientifically-based approaches in selecting the most representative sampling locations. A laboratory-scale pilot distribution system was designed comprising two parallel loops, one using unlined cast-iron pipe and one using PVC pipe. Each loop contained six sampling ports, including (1) a distribution main dead end faucet, (2) one long (5.5 m; 18 feet) and (3) one short (0.3 m; 1 foot) household copper service line with threaded hose-bibb taps, (4) one hose-bibb with welded faucet, (5) one dedicated sampling port (modeled after a manufacturer’s specifications) and (6) one laboratory-style (PVC) stop-cock sampling port. Residual chlorine concentrations were maintained at 0, 0.5, 1.5 and 2.0 mg/L stages during the course of the experiment. Bacterial samples were collected from the different sampling ports and assayed by membrane filtration and/or spread plate. Nutrient and R2A agars were used for heterotrophic plate counts (HPC), m-Endo agar for total coliform (TC) counts and Chromocult agar for injured bacterial analyses. Several methods of sample collection were tested using various combinations of flushing and tap disinfection, including “first flush” (no flushing, without tap disinfection), flushing only, tap disinfection only (using alcohol or hypochlorite solution) and flushing coupled with tap disinfection. The results indicated that the bacterial counts in samples drawn from dead ends were not significantly different from counts in samples from the other sample port configurations. First flush samples consistently produced the highest bacterial count results. Bacterial counts in samples from the long household copper service line were typically three orders of magnitude higher than in samples from the other sample ports. Thus, there is evidence that long copper household service connections may be unsuitable sample tap configurations for collecting samples intended to represent microbial quality in the distribution system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Hong, EJ, C. Sim, JS Chae, HC Kim, J. Park, KS Choi, DH Yu, CH Park, JG Yoo y BK Park. "Ultrastructural and molecular identification of Sarcocystis tenella (Protozoa, Apicomplexa) in naturally infected Korean native goats". Veterinární Medicína 61, No. 7 (18 de julio de 2016): 374–81. http://dx.doi.org/10.17221/93/2015-vetmed.

Texto completo
Resumen
Sheep is the intermediate host of the protozoan parasite Sarcocystis tenella, while the dog is its definitive host. This study was conducted to determine the prevalence of natural infection with S. tenella in slaughtered Korean native goat, Capra hircus coreanae, in the Republic of Korea. H-E stained heart tissues were investigated for the presence of sarcocysts. Of the 103 goats, three (2.91%) were diagnosed as positive for S. tenella by light, electron microscopic and molecular examination. The histopathological study showed a low frequency of microscopic Sarcocystis infection in slaughtered goats. In transmission electron microscopy, the sarcocysts were confirmed as S. tenella. Further DNA sequencing and phylogenic analysis support our identification of S. tenella with a 18S rRNA sequence identity of 100% between the experimental sequence and S. tenella. To our knowledge, this is the first record of S. tenella in Korean native goats from Korea. We thus report that the domestic goat is another intermediate host for S. tenella.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Scherrer, Simon, Markus Legner, Adrian Perrig y Stefan Schmid. "An Axiomatic Perspective on the Performance Effects of End-Host Path Selection". ACM SIGMETRICS Performance Evaluation Review 49, n.º 3 (22 de marzo de 2022): 16–17. http://dx.doi.org/10.1145/3529113.3529118.

Texto completo
Resumen
In various contexts of networking research, end-host path selection has recently regained momentum as a design principle. While such path selection has the potential to increase performance and security of networks, there is a prominent concern that it could also lead to network instability (i.e., flow-volume oscillation) if paths are selected in a greedy, load-adaptive fashion. However, the extent and the impact vectors of instability caused by path selection are rarely concretized or quantified, which is essential to discuss the merits and drawbacks of end-host path selection. In this work, we investigate the effect of end-host path selection on various metrics of networks both qualitatively and quantitatively. To achieve general and fundamental insights, we leverage the recently introduced axiomatic perspective on congestion control and adapt it to accommodate joint algorithms for path selection and congestion control, i.e., multi-path congestion-control protocols. Using this approach, we identify equilibria of the multi-path congestioncontrol dynamics and analytically characterize these equilibria with respect to important metrics of interest in networks (the "axioms") such as efficiency, fairness, and loss avoidance. We analyze how these axiomatic ratings for a general network change compared to a scenario without path selection, thereby obtaining an interpretable and quantititative formalization of the performance impact of end-host path-selection. Finally, we show that there is a fundamental trade-off in multi-path congestion-control protocol design between efficiency, stability, and loss avoidance on one side and fairness and responsiveness on the other side.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Chauhan, Ritu y Gatha Tanwar. "A Machine Learning-Based Exploration of Relationship Between Security Vulnerabilities of IoT Devices and Manufacturers". International Journal of Data Analytics 1, n.º 2 (julio de 2020): 1–12. http://dx.doi.org/10.4018/ijda.2020070101.

Texto completo
Resumen
The internet of things has brought in innovations in the daily lives of users. The enthusiasm and openness of consumers have fuelled the manufacturers to dish out new devices with more features and better aesthetics. In an attempt to keep up with the competition, the manufacturers are not paying enough attention to cyber security of these smart devices. The gravity of security vulnerabilities is further aggravated due to their connected nature. As a result, a compromised device would not only stop providing the intended service but could also act as a host for malware introduced by an attacker. This study has focused on 10 manufacturers, namely Fitbit, D-Link, Edimax, Ednet, Homematic, Smarter, Osram, Belkin Wemo, Philips Hue, and Withings. The authors studied the security issues which have been raised in the past and the communication protocols used by devices made by these brands. It was found that while security vulnerabilities could be introduced due to lack of attention to details while designing an IoT device, they could also get introduced by the protocol stack and inadequate system configuration. Researchers have iterated that protocols like TCP, UDP, and mDNS have inherent security shortcomings and manufacturers need to be mindful of the fact. Furthermore, if protocols like EAPOL or Zigbee have been used, then the device developers need to be aware of safeguarding the keys and other authentication mechanisms. The authors also analysed the packets captured during setup of 23 devices by the above-mentioned manufacturers. The analysis gave insight into the underlying protocol stack preferred by the manufacturers. In addition, they also used count vectorizer to tokenize the protocols used during device setup and use them to model a multinomial classifier to identify the manufacturers. The intent of this experiment was to determine if a manufacturer could be identified based on the tokenized protocols. The modelled classifier could then be used to drive an algorithm to checklist against possible security vulnerabilities, which are characteristic of the protocols and the manufacturer history. Such an automated system will be instrumental in regular diagnostics of a smart system. The authors then wrapped up this report by suggesting some measures a user can take to protect their local networks and connected devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía