Search results for " protocol"

showing 10 items of 1320 documents

Adaptogens in chemobrain (Part I): Plant extracts attenuate cancer chemotherapy-induced cognitive impairment – Transcriptome-wide microarray profiles…

2019

Abstract Background Cancer chemotherapy-induced cognitive impairments are presumably associated with undesirable effects of chemotherapy on physiological functions of brain cells. Adaptogens are natural compounds or plant extracts increasing an organism's adaptability and survival in stress. They exhibited neuroprotective effects and increased cognitive functions in clinical studies in human beings. Hypothesis We hypothesized that selected adaptogenic plant extracts attenuate or prevent cancer chemotherapy-induced cognitive impairments. Aim We assessed the effects of selected adaptogenic herbal extracts on FEC (fixed combination 5-fluorouracil, epirubicin and cyclophosphamide) induced chang…

MicroarrayPharmaceutical ScienceBiologyPharmacologyNeuroprotectionCell LineTranscriptome03 medical and health sciences0302 clinical medicineAntineoplastic Combined Chemotherapy ProtocolsDrug DiscoverymedicineHumansCognitive DysfunctionCyclophosphamideEpirubicinOligonucleotide Array Sequence AnalysisSchisandra030304 developmental biologyPharmacology0303 health sciencesPlant ExtractsMicroarray analysis techniquesGene Expression ProfilingAxon extensionNeurogenesisGene expression profilingmedicine.anatomical_structureGene Expression RegulationComplementary and alternative medicineFruit030220 oncology & carcinogenesisMolecular MedicineNeurogliaAndrographisNeurotoxicity SyndromesRhodiolaFluorouracilDiterpenesNeurogliaPhytomedicine
researchProduct

Sensor-Oriented Passive RFID

2010

This chapter addresses the design of new UHF tag antennas for sensing applications able to host detectors and additional electronics but also to act as passive sensor itself for some modification of the target. Starting from the consideration that the tag is both a digital and an analog device, sensing data may be achieved without using microcontrollers by a simple signal processing of the tag response and of the turn-on power. The chapter is particularly focused on the monitoring of human body features even if the proposed ideas and devices, here demonstrated by simulations and experimentation, may also be applied in a variety of scenarios.

MicrocontrollerSignal processingUltra high frequencySIMPLE (military communications protocol)business.industryComputer scienceDetectorElectronicsRFID sensorbusinessHost (network)Computer hardwareAnalog device
researchProduct

L’incriminazione dello smuggling of migrants in Europa: una ricognizione comparatistica

2019

Il lavoro opera una ricognizione comparatistica di varie discipline del migrant smuggling: internazionale (Protocollo ONU), sovranazionale (UE Facilitation package) e nazionali (Italia, Portogallo, Spagna, Germania), a partire dai dati raccolti nel corso della ricerca "The New Era of Smuggling in the Mediterranean Sea" (2017-19), finanziata da PMI

Migrant smuggling - Facilitation package - UN Protocol against smuggling - State-centred paradigm - Migrant-centred paradigmSettore IUS/17 - Diritto Penale
researchProduct

Smuggled migrants as victims? Reflecting on the UN Protocol against migrant smuggling and on its implementation

2021

After outlining the UN Protocol’s general approach to migrant smuggling, the paper raises the question of whether and to what extent smuggled migrants can be said to be victims of this crime. The author argues that an affirmative answer is possible in at least three different senses: smuggled migrants can be victimized by states fighting against migrant smuggling and irregular immigration (secondary victimization); but, of course, they can also be victimized by smugglers (primary victimization), in two ways: first, if smuggling is so performed as to put their lives, physical integrity or dignity at risk; secondly, smugglers also victimize migrants by profiting of their vulnerable condition,…

Migrant smugglingSettore IUS/17 - Diritto PenaleSoM ProtocolDirective 2002/90/ECEU Facilitation package
researchProduct

Using MANET Protocols in Wireless Sensor and Actor Networks

2008

Although there are several routing protocols for wireless sensor and actor networks (WSAN), none of them have became standard. Now, there are several standard protocols for mobile ad hoc networks (MANET) that have been developed for devices with higher computing features than the sensor nodes. On the other hand, one of the main characteristics of the MANET protocols is their scalability. In this paper, we show the performance of a WSAN, when MANET protocols are used, for several topologies. We will discuss and evaluate which standard protocol is the best one depending on the number of nodes in the topology and depending on their mobility. Finally we will show their comparison. As far as we …

Mobile radioRouting protocolbusiness.industryComputer scienceWireless ad hoc networkDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile ad hoc networkNetwork topologyScalabilityWirelessbusinessWireless sensor networkComputer network2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)
researchProduct

A MANET Autoconfiguration System based on Bluetooth Technology

2006

The availability of both Wi-Fi and Bluetooth technologies on currently available devices offers the possibility to combine both in order to make the most out of their capabilities. In this paper we propose using Bluetooth technology to solve the configuration problem of the terminals conforming an IEEE 802.11-based ad-hoc network. The main objective of mobile ad- hoc networks (MANETs) is to extend the connectivity range of nodes through packet forwarding, thereby avoiding the use of a fixed infrastructure. However, since configuration of nodes is a complex issue, we provide a fast and reliable solution to auto-configure MANET terminals. Our solution is adequate for the quick setup and deplo…

Mobile radioSIMPLE (military communications protocol)Computer sciencebusiness.industryWireless ad hoc networkDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwardingMobile ad hoc networklaw.inventionBluetoothIEEE 802.11Software deploymentlawbusinessComputer network2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Complete Shadowing Modeling and its Effect on System Level Performance Evaluation

2008

Computer simulations are a common procedure for assessing the performance of new algorithms. To conduct a valid and accurate study, the models employed in such simulators need to be carefully selected. Regarding shadowing modeling, one-dimensional models are fairly commonplace in the literature. While simple and with low computational costs, these models can not produce correlated fading values for mobiles that are in nearby positions and, besides, do not include the cross-correlation effect. To overcome these limitations, this paper presents a bi-dimensional shadowing model which introduces both the spatial correlation and the cross-correlation present in real systems. Finally, the impact …

Mobile radioSpatial correlationComputer engineeringComputer sciencelawRadio access technologyRadio Link ProtocolTransmitterElectronic engineeringFadingShadow mappingUMTS frequency bandslaw.inventionVTC Spring 2008 - IEEE Vehicular Technology Conference
researchProduct

Group mobility impact over TCP and CBR traffic in mobile ad hoc networks

2004

We present an analysis of the effect that mobility models have over the performance of a mobile ad hoc network. We concentrate on group mobility because there is a growing attention on the development and evaluation of MANET's approach applied to personal area networks (PANs), especially based on Bluetooth technology. We investigate the effect that the mobility model has on the performance of CBR traffic and TCP traffic. We propose four different group mobility models and describe a mobility pattern generator called grcmob to be used with the ns-2 simulator. We perform a thorough evaluation of a MANET behavior using as a reference the behavior obtained with the random waypoint mobility mode…

Mobility modelVehicular ad hoc networkbusiness.industryComputer scienceWireless ad hoc networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingMobile ad hoc networklaw.inventionBluetoothOptimized Link State Routing ProtocollawMobile telephonybusinessComputer network12th Euromicro Conference on Parallel, Distributed and Network-Based Processing, 2004. Proceedings.
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Verifying a medical protocol with temporal graphs: the case of a nosocomial disease.

2014

Abstract Objective Our contribution focuses on the implementation of a formal verification approach for medical protocols with graphical temporal reasoning paths to facilitate the understanding of verification steps. Materials and methods Formal medical guideline specifications and background knowledge are represented through conceptual graphs, and reasoning is based on graph homomorphism. These materials explain the underlying principles or rationale that guide the functioning of verifications. Results An illustration of this proposal is made using a medical protocol defining guidelines for the monitoring and prevention of nosocomial infections. Such infections, which are acquired in the h…

Model checking[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationComputation tree logicTheoretical computer scienceComputer scienceModel checking Medical protocolMédecine humaine et pathologieCritical Care and Intensive Care MedicineMedical guidelineConsistency (database systems)Clinical Protocols[ SDV.MHEP ] Life Sciences [q-bio]/Human health and pathologyDrug Resistance BacterialHumansFormal verificationProblem SolvingProtocol (science)Cross Infectionbusiness.industryVisual informationModels TheoreticalModélisation et simulationNosocomial diseases[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationConceptual graphsCatheter-Related InfectionsConceptual graphCarrier StateVisual modelingDisease SusceptibilitySoftware engineeringbusiness[SDV.MHEP]Life Sciences [q-bio]/Human health and pathologyAlgorithmsJournal of critical care
researchProduct