Advanced searches left 3/3

Protocol - Wiley Online Library

Summarized by Plex Scholar
Last Updated: 24 September 2022

* If you want to update the article please login/register

An efficient Industrial Internet of Things video data processing system for protocol identification and quality enhancement

In a typical IIoT scenario, the video's protocol is first recognized, which prepares for subsequent video projects. Since recent, extensive research has been put into place on the protocol detection and video quality enhancement tasks on IIoT edge devices using deep neural networks. Since DNNs often require high computational capabilities, large computational capabilities are often needed, sophisticated networks can hardly be built on edge routers. With a fast inference rate for PI, our proposed system on an IIoT edge device can produce an accuracy of greater than 97. 2 percent.

Source link: https://onlinelibrary.wiley.com/doi/10.1049/cps2.12035


An advanced LC‐MS/MS protocol for simultaneous detection of Pharmaceuticals and Personal Care Products in the environment

The introduction of appropriate analytical screening methods for pharmaceuticals and personal care products is the starting point for investigating the distribution and environmental effects of emerging contaminants. This paper presents a single analytical data acquisition procedure for the simultaneous detection of thirty-u2010four PPCPs in several environmental samples in a single analytical data acquisition run.

Source link: https://onlinelibrary.wiley.com/doi/10.1002/rcm.9397


Blockchain based security protocol for device to device secure communication in internet of things networks

The IoT network is vulnerable to a variety of security issues due to its autonomy and several breaches of security legislation. Blockchain can be used to solve security issues in the IoT. One way to achieve this is to make secure communication between IoT devices. We develop an effective method for intranetwork and internetworking that allows IoT device identification and authentication while still providing safe communication in a distributed environment. We've conducted an informal security analysis, which shows that there are no significant security risks in our protocol.

Source link: https://onlinelibrary.wiley.com/doi/10.1002/spy2.267


Rapid and reliable inactivation protocols for the diagnostics of emerging viruses: The example of SARS‐CoV‐2 and monkeypox virus

As seen with the continuing epidemic acute respiratory coronavirus 2 pandemic and the more recent public health threat of monkeypox virus since May 2022, the emergence and sustained dissemination of novel pathogens is placing an increasing strain on the diagnostics industry around the world. In the present investigation, seven commercialized diagnosis buffers, heat, and sodium dodecyl sulfate detergent were tested against infectious SARS, 2010CoVu20102 and MPXV culture isolates on Vero cell culture. Inactivation of MPXV was also confirmed with all tested methods with 6. 9 log10 reductions, although some commercial buffers did require a longer incubation period to achieve complete inactivation.

Source link: https://onlinelibrary.wiley.com/doi/10.1002/jmv.28126


A Patient‐to‐Model‐to‐Patient (PMP) Cancer Drug Discovery Protocol for Identifying and Validating Therapeutic Agents Targeting Tumor Regulatory Architecture

The inability to establish precise and dependable links between mechanistic sources of the disease, therapeutically relevant molecular targets, aes, and patient subgroups of cancer drug discovery is the Achilles heel of cancer drug discovery. We present a six-step patient model from u2010-to-u2010patient protocols that use computational and experimental techniques to reconstruct and interrogate human cancer cells' regulatory logic for identifying and therapeutically targeting the tumor checkpoint as well as existing pharmaceutical agents. The combination of a drug's contextu2010specific MOA and precise identification of patients'u2019 tumor checkpoints leads to a more precise, mechanism-u2010-based biomarker that can be used to support prospective clinical trials with patients likely to respond.

Source link: https://onlinelibrary.wiley.com/doi/10.1002/cpz1.544


PROTOCOL: The support needs of families living with parental mental illness: A qualitative systematic review

To synthesize qualitative evidence on the effects of family living with parental mental illness and the acceptance and attitude toward services from the perspective of i children, ii parents with a mental disorder, and ii the mature parent in order to improve the understanding of family needs and service delivery.

Source link: https://onlinelibrary.wiley.com/doi/10.1002/cl2.1267


An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing

Green algorithms have been recently introduced to minimize energy consumption by changing the framework of several algorithms used in the network and its protocols, according to one. In Fog computation, this paper introduces a new green reliability algorithm for Transmission Control Protocol/Internet Protocol in Fog computations. It is based on moving fewer packets in the network by taking advantage of the differences between TCP and User Datagram Protocol, which can be used to accomplish this. The number of total packets in UDP is half of that of TCP, and User Datagram Protocol are both similar in essence, as the number of total packets in UDP is half that of TCP. As a result, the number of complete packets in UDP is half that of TCP. According to these situations, the UDP protocol can substitute TCP. In other words, the UDP protocol will be used as long as QoS requirements are fulfilled. The switching process between UDP and TCP is highly dynamic, and optimized by estimating network disturbance in the period.

Source link: https://onlinelibrary.wiley.com/doi/10.1111/exsy.13129


Do‐it‐Yourself Mock Community Standard for Multi‐Step Assessment of Microbiome Protocols

We first outline the steps to verify community members' identities by Sanger sequencing. We offer tips on assembling and storing the DIY mock community as complete whole cells. Following sequencing, there were steps to develop standard growth curves based on plate counts for each individual's so that the community members can be measured and compared later. We also discuss appropriate methods for the cryostorage of the fully assembled mock population as whole cells, so that they can be used as a unit in a microbiome analysis, from the lysis and nucleic acid extraction steps forwards. Lastly, we offer an example of returned results and interpretation of DIY mock community sequences, as well as discussing how to determine potential contamination and identify protocol biases for particular members. Overall, DIY mock communities help identify success and potential bias in a cultivation-u2010independent microbiome study. Basic Protocol 1: Identification and verification using Sanger sequencing Basic Protocol 1: For long-term cryostorage, the creation of glycerol stocks of each mock community strain is a function of optical density and the design of a full mock community assembly Basic Protocol 1: Establishing of a standard curve to determine CFU/ml of a liquid culture without cryoprotectant Basic Protocol 3: Basic Protocol 5: Basic Protocol 5: Basic Protocol 5: Establishment of a strain freezer viability of Using Sanger.

Source link: https://onlinelibrary.wiley.com/doi/10.1002/cpz1.533


Protocols for cleaning the incisor access cavity contaminated with epoxy resin sealer

Images taken before and after cleaning using image analysis software determined that each tooth was split and the sealeru2010covered portion of the pulp chamber was determined on photographs taken before and after cleaning using image analysis software. For MB+ etching, MB + air polishing, and MB alone, there was a significant decrease in the area covered by a significant sealer reduction than after air/water spray and ethanolu2010saturated cotton pellet reduction.

Source link: https://onlinelibrary.wiley.com/doi/10.1111/eos.12894

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions