Search results for " protocols"
showing 10 items of 761 documents
Application of Zero Exclusion Condition to Stability Analysis of Computer Networks
2016
Stability, or robust [Dscr ]-stability analysis of computer network considered as a dynamic system, relies on increasing the speed of data transmission while minimizing the queuing time delays of its packets in the router buffers that can affect the overall data flow of the network traffic. We consider a zero exclusion condition as an effective method for testing and analyzing the computer networks stability. Our findings indicate that keeping control over the queuing time delays as well as including some factors of the RED algorithm and its variants, which we present in this paper, can improve the quality of network services significantly. Our method can be applicable both to single-loop a…
Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols
2015
LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of …
Abemaciclib: safety and effectiveness of a unique cyclin-dependent kinase inhibitor
2020
Introduction: The discovery and the clinical availability of novel cyclin-dependent kinases 4 and 6 inhibitors have profoundly changed the therapeutic scenario of metastatic hormone receptor-positive breast carcinoma. Among these inhibitors, abemaciclib can induce potent and sustained cell cycle arrest and immune system stimulation. Areas covered: This review summarizes the safety profile and clinical efficacy data on abemaciclib alone or in combination with aromatase inhibitors or fulvestrant in metastatic hormone receptor-positive breast carcinoma. The management of patients treated with abemaciclib is the object of this paper. Expert opinion: As shown in phase 2 and 3 clinical trials on …
Impact of Structural, Photochemical and Instrumental Effects on Leaf and Canopy Reflectance Variability in the 500–600 nm Range
2021
Current rapid technological improvement in optical radiometric instrumentation provides an opportunity to develop innovative measurements protocols where the remote quantification of the plant physiological status can be determined with higher accuracy. In this study, the leaf and canopy reflectance variability in the PRI spectral region (i.e., 500–600 nm) is quantified using different laboratory protocols that consider both instrumental and experimental set-up aspects, as well as canopy structural effects and vegetation photoprotection dynamics. First, we studied how an incorrect characterization of the at-target incoming radiance translated into an erroneous vegetation reflectance spectru…
H.264 QoS and Application Performance with Different Streaming Protocols
2015
Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed
Comparison of inter-trial recovery times for the determination of critical power and W' in cycling
2017
Critical Power (CP) and W’ are often determined using multi-day testing protocols. To investigate this cumbersome testing method, the purpose of this study was to compare the differences between the conventional use of a 24-h inter-trial recovery time with those of 3 h and 30 min for the determination of CP and W’. Methods: 9 moderately trained cyclists performed an incremental test to exhaustion to establish the power output associated with the maximum oxygen uptake (p V O2max), and 3 protocols requiring time-to-exhaustion trials at a constant work-rate performed at 80%, 100% and 105% of p VO2max. Design: Protocol A utilised 24-h inter-trial recovery (CP24/W’24), protocol B utilised 3-h in…
A framework for Population Protocols in VANETs
2023
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
Underwater Multirobot Cooperative Intervention MAC Protocol
2020
This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…
Computer Networks
2018
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.