Search results for " protocol"
showing 10 items of 1320 documents
Meeting others—supporting situation awareness on the WWW
2001
Abstract World Wide Web (WWW) techniques provide a simple interface, which is accessible almost everywhere. The WWW supports document sharing and information retrieval, but has no tools for direct user interaction, simply because the mechanisms to support user awareness are missing. The aim of this paper is twofold. First, we present general concepts of situation awareness, which concerns the user interaction on the WWW platform, and a theoretical framework, which is used in examining existing awareness support systems. Second, we provide an analysis of PeopleAwarenessEngine, which supports situation awareness and enables user communication and collaboration on the WWW.
Polymorphisms in DNA repair genes modulate survival in cisplatin/gemcitabine-treated non-small-cell lung cancer patients.
2006
Abstract Background: Impaired DNA repair capacity may favorably affect survival in cisplatin/gemcitabine-treated non-small-cell lung cancer (NSCLC) patients. We investigated the association of survival with genetic polymorphisms in X-ray repair cross-complementing group 1 and group 3 (XRCC3), xeroderma pigmentosum group D (XPD), excision repair cross-complementing group 1, ligase IV, ribonucleotide reductase, TP53, cyclooxygenase-2, interleukin-6, peroxisome proliferator-activated receptor γ, epidermal growth factor, methylene-tetra-hydrofolate reductase and methionine synthase. Patients and methods: One hundred and thirty-five stage IV or IIIB (with malignant pleural effusion) NSCLC patien…
Fast Secure Routing for Highly Mobile Large-Scale Ad-Hoc Vehicular Networks
2009
In highly mobile large-scale vehicular ad-hoc networks, routing protocols must be fast and efficient in terms of low routing discovery delay and communication overhead to support the applications such as car talk. Such requirement becomes more difficult to achieve when inducing security enhancement to tackle the authentication of routing messages. In this paper, we propose a lightweight (fast) secure routing protocol, Secure Proactive Tree-based Routing (SPTR) to hit these two points. SPTR makes use of the characteristics of VANET networks, that is, the traffic originates from or terminates at the gateway or road side unit. SPRT also takes advantages of certificate-less ID-based cryptograph…
Multipath extensions to the DYMO routing protocol
2007
Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.
Simulation-based Evaluation of DMAMAC - A Dual-Mode Adaptive MAC Protocol for Process Control
2015
Control systems automation is widely used in many industrial domains and have strong requirements on delay, throughput, robustness, and reliability. In the domain of networked control systems, the medium of communication is increasingly involving wireless communication along-side conventional wired communication. Issues ranging from energy efficiency and reliability to low-bandwidth have to be addressed to enable the transition to increased use of wireless communication. In earlier work, we have proposed the Dual-Mode Adaptive MAC (DMAMAC) protocol relying on a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA). The DMAMAC protocol is able to dynami…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
SECURE SOLUTION FOR MODERN SEMANTIC SCADA
2013
International audience; NOUS TRAVAILLONS SUR LA SECURITE DES SYSTEMES SCADA (SUPERVI-SORY CONTROL AND DATA AQUISITION) MODERNE EXPLOITANT DES EQUI-PEMENTS MODRNE AVEC DE L’INTELLIGENCE EMBARQUE COMME LES RTU (REMOTE TERMINAL UNIT), LES CAPTEURSINTELLIGENTS, LES ACTIONNEURS INTELLIGENTS, LES EQUIPEMENTS DE L’INSTRUMENTATION GAZIERE MODERNE COMME LES COMPTEURS NUME-RIQUE, LES CORECTEURS ELECTONIQUE, LES POMPES DOSEUSES AVEC CARTE ELECTRONIQUE, LES CHROMATOGRAPHES...ECT. AVEC LES AVANCES TECHNLOGIQUES DE L’INFORMATIQUE EMBARQUE COMME LES SERVICES WEB ET LES APPLICATION CONCU SELON LES ARCHITECTURES MODERNE (SOA- SERVICE ORIENTED ARCHITECTURE), LES ONTOLOGIES ET LE WEB SEMANTIQUE, LES BASES DE …
IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments
2017
International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…
Actinic cheilitis: Proposal of a clinical index.
2021
Actinic cheilitis is a potentially malignant lesion most commonly found in the lower lip of individuals with chronic exposure to ultraviolet radiation. The aim of this study was to develop and to test a clinical index that can be used to assess the severity of actinic cheilitis. The clinical index of actinic cheilitis was applied to 36 patients. An incisional biopsy was obtained to grade oral epithelial dysplasias following the World Health Organization (WHO) and binary systems, and to evaluate their association with clinical characteristics by Fisher?s exact test (P<0.05). The accuracy of the index was evaluated based on sensitivity, specificity, positive and negative predictive values, an…
Relapse risk after autologous transplantation in patients with newly diagnosed myeloma is not related with infused tumor cell load and the outcome is…
2006
BACKGROUND AND OBJECTIVES: This European Group for Blood and Marrow Transplantation (EBMT) multicentre randomized phase III study was designed to assess the safety and efficacy of CD34+ selection in newly diagnosed myeloma patients undergoing autologous transplantation. DESIGN AND METHODS: One hundred and eleven patients responsive to initial chemotherapy were randomized to receive CD34+ selected (arm A) or unselected PBPC (arm B) after conditioning with high-dose melphalan and TBI. ASO-PCR was used to assess purging efficacy and reinfused tumor load. Tumor load could be assessed in 59 patients. RESULTS: CD34+ selection gave a median tumor cell depletion of 2.2 logs (0.77-5.96). No tumor ce…