Search results for "Architecture"

showing 10 items of 3706 documents

P4571PFA-100, a test of platelet adhesion/aggregation, predicts cardiovascular events after an acute coronary syndrome and can help in the decision-m…

2019

Abstract Background The dual antiplatelet therapy (DAPT) duration is a matter of great interest among cardiologists. Because of the conflicting evidences and the necessity to balance the reduction in major cardiac events (MACE) occurrence and the risk of major bleedings after an acute coronary syndrome (ACS), there is a general consensus on prolonging DAPT on an individual basis. There is less consensus on which parameters are to be evaluated. Nowadays tests of platelet reactivity are not included in the decision-making. Few data are available on the prognostic value of aspirin response tests that are sensitive to other mediators of platelet adhesion and aggregation in vivo under flow condi…

Acute coronary syndromemedicine.medical_specialtybusiness.industryInternal medicinePlatelet adhesionmedicineCardiologyDUAL (cognitive architecture)Cardiology and Cardiovascular Medicinemedicine.diseasebusinessEuropean Heart Journal
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Utility-based resource allocations in multi-hop wireless networks

2011

It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …

Ad-hoc Networks; Distributed Resource Allocation; Game theory; Sensor NetworksSettore ING-INF/04 - Automatica[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad-hoc Networksad hoc wireless networks allocations networksSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSensor NetworksDistributed Resource AllocationGame theory
researchProduct

Middleware with QoS Support to Control Intelligent Systems

2008

This paper presents the architecture of a middleware for control component-based distributed systems. The fundamental idea underlying this architecture is the use of a hierarchical communications structure called "logical namespace tree" and a structured set of control processes interconnected, called "logical sensors graph". This architecture is named frame sensor adapter control (FSA-Ctrl). The aim of FSA-Ctrl is to provide a simple interface to specify the control actions and ensure a communication with some specified QoS parameters restrictions. In this architecture both systems, communication and control, manages the QoS policies. The communication system is based on the data distribut…

Adapter (computing)Computer sciencebusiness.industryQuality of serviceControl systemDistributed computingIntelligent decision support systemData Distribution ServiceNamespaceSoftware architecturebusinessCommunications systemComputer network2008 The Second International Conference on Advanced Engineering Computing and Applications in Sciences
researchProduct

An FPGA-Based Adaptive Fuzzy Coprocessor

2005

The architecture of a general purpose fuzzy logic coprocessor and its implementation on an FPGA based System on Chip is described. Thanks to its ability to support a fast dynamic reconfiguration of all its parameters, it is suitable for implementing adaptive fuzzy logic algorithms, or for the execution of different fuzzy algorithms in a time sharing fashion. The high throughput obtained using a pipelined structure and the efficient data organization allows significant increase of the computational capabilities strongly desired in applications with hard real-time constraints.

Adaptive neuro fuzzy inference systemfuzzy inferenceCoprocessorAdaptive algorithmbusiness.industryComputer scienceMembership functionsControl reconfigurationSettore ING-INF/01 - ElettronicaFuzzy logicFuzzy logicFuzzy electronicsComputer Science::Hardware ArchitectureEmbedded systembusinessThroughput (business)Membership function
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

Optimization design process of a morphing winglet

2018

Aeronautic and aerospace engineering is recently moving in the direction of developing morphing wing devices, with the aim of making adaptable the aerodynamic shapes to different operational conditions. Those devices may be classified according to two different conceptual architectures: kinematic or compliant systems. Both of them embed within their body all the active components (actuators and sensors), necessary to their operations. In the first case, the geometry variation is achieved through an augmented classical mechanism, while in the second case the form modification is due to a special arrangement of the inner structure creating a distributed elastic hinges arrangement. Whatever is…

Adaptive winglet topology optimization morphing devices load alleviation and controlWingProcess (engineering)Computer scienceTopology optimizationControl engineering02 engineering and technologyAerodynamicsKinematics021001 nanoscience & nanotechnologyAeroelasticity01 natural sciences010309 opticsMorphingRobustness (computer science)Adaptive system0103 physical sciencesSystems architectureDesign processWingtip deviceSettore ING-IND/04 - Costruzioni E Strutture Aerospaziali0210 nano-technologyEngineering design processActuatorBioinspiration, Biomimetics, and Bioreplication VIII
researchProduct

Three-dimensional analysis of tumour vascular corrosion casts using stereoimaging and micro-computed tomography

2009

Objective: In order to perform effective translational research for cancer therapy, we need to employ preclinical models which reflect the clinical situation. The purpose of this study was to quantitatively compare the vascular architecture of human colorectal cancer and experimental tumour models to determine the suitability of animal models for vascular studies and antivascular therapy.Methods: In this study we investigated the three-dimensional properties of colonic tumour vasculature in both human clinical tissues (normal mucosa control [n = 20], carcinoma [n = 20] and adenoma In = 61) and murine colorectal xenografts (LS147T [n = 6] and SW1222 [n = 6]). Scanning Electron Microscope Ste…

AdenomaMalePathologymedicine.medical_specialtyX-ray microtomographyAdenomaColonColorectal cancerAngiogenesisTransplantation HeterologousMice NudeCorrosion CastingBiochemistryArticleMiceangiogenesisImaging Three-DimensionalmikrotomografiaIntestinal mucosaRenal cell carcinomaCell Line TumorNeoplasmsstereoimagingmedicineCarcinomaAnimalsHumansmicrovascular architectureIntestinal Mucosamicro-computed tomographybusiness.industryCarcinomaverisuoniston mikrorakennestereokuvausX-Ray MicrotomographytortuositeettiCell Biologymedicine.diseaseangiogeneesikorroosiovalucorrosion castingTransplantationMicrovesselsMicroscopy Electron ScanningFemaletortuosityColorectal NeoplasmsCardiology and Cardiovascular MedicinebusinessMicrovascular Research
researchProduct

3D microvascular architecture of pre-cancerous lesions and invasive carcinomas of the colon.

2001

Despite the significance of tumour neoangiogenesis and the extensive knowledge on the molecular basis of blood vessel formation currently no quantitative data exist on the 3D microvascular architecture in human primary tumours and their precursor lesions. This prompted us to examine the 3D vascular network of normal colon mucosa, adenomas and invasive carcinomas by means of quantitative microvascular corrosion casting. Fresh hemicolectomy specimens from 20 patients undergoing cancer or polyposis coli surgery were used for corrosion casting, factor VIII and VEGF immunostaining. In addition, immunostaining was done on colorectal tissue from 33 patients with metastatic and non-metastatic carci…

AdenomaMaleVascular Endothelial Growth Factor ACancer ResearchPathologymedicine.medical_specialtytumour vascular architectureAdenomaAngiogenesisAdenomatous polyposis coliEndothelial Growth FactorsMetastasisNeovascularizationangiogenesisImage Processing Computer-AssistedMedicineHumansNeoplasm InvasivenessGrading (tumors)AgedLymphokinesbiologybusiness.industryVascular Endothelial Growth FactorsMicrocirculationCancerRegular ArticleMiddle Agedmedicine.diseasecolorectal adenocarcinomapre-cancerous lesionsOncologyAdenomatous Polyposis ColiColonic Neoplasmsbiology.proteinFemalemedicine.symptombusinessColorectal NeoplasmsPrecancerous ConditionsImmunostainingBritish journal of cancer
researchProduct

An Investigation of the Roles of Group Identification, Perceived Ability, and Evaluative Conditions in Stereotype Threat Experiences

2019

The Multi-Threat Framework distinguishes six qualitatively distinct stereotype threats. Up to now, few studies have been performed to identify the situational and individual determinants of different stereotype threat experiences. This study investigates the role of group identification, perceived ability, and evaluative conditions (private/public) in six stereotype threat experiences for 261 French Physical Education Students. The results show that the expression level of the different stereotype threats does not vary according to evaluative conditions. In contrast, group identification affects all the forms of stereotype threats, and for three forms of stereotype threats, this effect is …

Adolescent050109 social psychology050105 experimental psychologyPhysical educationYoung AdultHumans0501 psychology and cognitive sciencesSituational ethicsStudentsPractical implicationsGeneral PsychologyStereotypingPhysical Education and TrainingSocial Identification05 social sciencesStereotype (UML)Contrast (statistics)Self ConceptGroup identificationStereotype threatExpression (architecture)FemaleFrancePsychologySocial psychologySportsPsychological Reports
researchProduct