Dual protection: A tydeoid mite effectively controls both a problem pest and a key pathogen in tomato

2021 ◽  
Author(s):  
Juliette Pijnakker ◽  
Rob Moerkens ◽  
Dominiek Vangansbeke ◽  
Marcus Duarte ◽  
Stijn Bellinkx ◽  
...  
Keyword(s):  
2021 ◽  
pp. bmjinnov-2020-000534
Author(s):  
Patricia S Coffey ◽  
Maggie Kilbourne-Brook

ObjectiveThe female condom is a non-hormonal barrier method that can protect from unintended pregnancy and sexually transmitted infections such as HIV. Female condoms are an important contribution to women’s reproductive health globally as they are the only woman-initiated method currently available that can provide dual protection. This article describes how human-centred design (HCD) was applied to the development of the Woman’s Condom—a second-generation female condom.MethodsA multidisciplinary team pioneered the application of HCD principles to develop a novel reproductive health product. The Woman’s Condom design incorporated feedback from both female and male users from multiple sites in the USA and Cuernavaca, Mexico; Durban, South Africa and Khon Kaen, Thailand to inform product development.ResultsWe developed and tested more than 50 design iterations reflecting various solutions to user-related concerns. The final locked design confirmed that the Woman’s Condom was easy to use, stable, comfortable and provided satisfactory sensation during sex for both partners. The ‘dissolving capsule’ to facilitate insertion and ‘soft cling’ design are key innovative features of the Woman’s Condom.ConclusionThe Woman’s Condom is a second-generation female (or internal) condom product that has been shown to be highly acceptable to users throughout the world. The Woman’s Condom’s special design features enable easy insertion, secure fit during use, good sensation and easy removal. Engaging users as codesigners through an HCD approach resulted in a female condom that meets the needs of women and men from diverse regions.


Nanoscale ◽  
2015 ◽  
Vol 7 (12) ◽  
pp. 5292-5298 ◽  
Author(s):  
Mingpeng Yu ◽  
Aiji Wang ◽  
Fuyang Tian ◽  
Hongquan Song ◽  
Yinshu Wang ◽  
...  

2017 ◽  
Vol 49 (4) ◽  
pp. 223-236 ◽  
Author(s):  
Angela Kaida ◽  
Sophie Patterson ◽  
Allison Carter ◽  
Mona Loutfy ◽  
Erin Ding ◽  
...  

RSC Advances ◽  
2013 ◽  
Vol 3 (41) ◽  
pp. 18691 ◽  
Author(s):  
Ulf Ragnarsson ◽  
Leif Grehn
Keyword(s):  

As the world is getting digitalized, the rush for need of secured data communication is overtop. Provoked by the vulnerability of human visual system to understand the progressive changes in the scenes, a new steganography method is proposed. The paper represents a double protection methodology for secured transmission of data. The original data is hidden inside a cover image using LSB substitution algorithm. The image obtained is inserted inside a frame of the video producing a stego-video. Stego-video attained is less vulnerable to attacks. After decryption phase, the original text is obtained which is error-free and the output image obtained is similar as the cover image. The quality of stego-video is high and there is no need for additional bandwidth for transmission. The hardware implement is required in order to calculate the corresponding analytical results. The proposed algorithm is examined and realized for various encryption standards using Raspberry Pi3 embedded hardware. The results obtained focuses on the attributes of the proposed model. On comparing with other conventional algorithms, the proposed scheme exhibits high performance in both encryption and decryption process with increase in efficiency of secured data communication.


PLoS ONE ◽  
2013 ◽  
Vol 8 (1) ◽  
pp. e54123 ◽  
Author(s):  
Shinichiro Wada ◽  
Satoshi Chiba
Keyword(s):  

EP Europace ◽  
2012 ◽  
Vol 15 (3) ◽  
pp. 317-324 ◽  
Author(s):  
R. L. Verrier ◽  
K. Kumar ◽  
T. Nieminen ◽  
L. Belardinelli

Sign in / Sign up

Export Citation Format

Share Document