Search results for "Latency"

showing 5 items of 135 documents

Excessive Daytime Sleepiness in Obstructive Sleep Apnea Patients Treated With Continuous Positive Airway Pressure: Data From the European Sleep Apnea…

2021

Excessive daytime sleepiness (EDS) is a symptom of obstructive sleep apnea (OSA) that resolves under treatment with continuous positive airway pressure (CPAP). In some patients, sleepiness persists despite CPAP treatment. We retrospectively analyzed data on subjective residual EDS, assessed as an Epworth Sleepiness Scale score (ESS) >10, in patients from the European Sleep Apnea Database (n = 4,853, mean age +/- SD 54.8 +/- 11.8 years, 26.1% females), at baseline and at the first visit (median follow-up: 5 months, interquartile range 3-13). An ESS > 10 occurred in 56% of patients at baseline and in 28.2% of patients at follow-up. Residual EDS was analyzed in 2,190 patients (age: 55.1 +/- 12…

sleep latencyResidual Sleepinessmedicine.medical_treatment[SDV]Life Sciences [q-bio]Excessive daytime sleepinessSettore MED/10 - Malattie Dell'Apparato Respiratoriocomputer.software_genreCpap adherence03 medical and health sciences0302 clinical medicineInterquartile rangeCpap Usemedicinefollow-upContinuous positive airway pressureObesityRC346-429ComputingMilieux_MISCELLANEOUSresidual sleepnessOriginal ResearchWake-Active NeuronsDatabasebusiness.industryresidual sleepineEpworth Sleepiness ScaleSleep apneaEpworth sleepness ScaleEpworth Sleepiness Scalemedicine.diseaseCPAP adherenceImportant Differencenervous system diseasesrespiratory tract diseasesScaleObstructive sleep apneaLifestyle factors030228 respiratory systemNeurologysleep durationHuman medicineNeurology. Diseases of the nervous systemNeurology (clinical)medicine.symptombusinesscomputer030217 neurology & neurosurgery
researchProduct

Age of Information Based URLLC-enabled UAV Wireless Communications System

2022

This paper considers an unmanned aerial vehicles (UAV) communication network, where UAV operate as an aerial mobile relay between a source and a destination of the network. To capture the “timelines” of the received information at the destination node, a new performance metric named age of information (AoI) is considered. In addition, a short packet communication scheme maintains low latency in the proposed UAV wireless communication system. The finite block-length theory investigates the performances of short packet communications scheme in the UAV-assisted wireless communications system. In this paper, the Average Age of Information (AAoI) is estimated by applying the Stochastic Hybrid Sy…

ultra-reliable and low-latency communications (URLLC)age of information (AoI)stochastic hybrid systems (SHS)ComputerApplications_COMPUTERSINOTHERSYSTEMStietoliikenneverkotfinite block length regimemiehittämättömät ilma-aluksetUAV communication
researchProduct

Mouse models of cytomegalovirus latency: overview.

2002

Abstract Background: The molecular regulation of viral latency and reactivation is a central unsolved issue in the understanding of cytomegalovirus (CMV) biology. Like human CMV (hCMV), murine CMV (mCMV) can establish a latent infection in cells of the myeloid lineage. Since mCMV genome remains present in various organs after its clearance from hematopoietic cells first in bone marrow and much later in blood, there must exist one or more widely distributed cell type(s) representing the cellular site(s) of enduring mCMV latency in host tissues. Endothelial cells and histiocytes are candidates, but the question is not yet settled. Another long debated problem appears to be solved: mCMV establ…

virusesCytomegalovirusBiologymedicine.disease_causeVirusHerpesviridaeImmediate-Early ProteinsTransactivationMiceViral ProteinsVirologyVirus latencymedicineCytotoxic T cellAnimalsHumansLatency (engineering)GeneMice Inbred BALB Cvirus diseasesmedicine.diseaseVirologyVirus LatencyHaematopoiesisDisease Models AnimalInfectious DiseasesImmunologyCytomegalovirus InfectionsTrans-ActivatorsVirus ActivationJournal of clinical virology : the official publication of the Pan American Society for Clinical Virology
researchProduct

Enhancement by TNF-alpha of reactivation and replication of latent herpes simplex virus from trigeminal ganglia of mice.

1995

The influence of tumor-necrosis-factor-alpha (TNF-alpha), granulocyte-macrophage colony-stimulating factor (GM-CSF), interleukine-1 (IL-1) and IL-3 on the in vitro reactivation frequency and replication rate of trigeminal ganglia of mice latently infected with herpes simplex virus (HSV) strain KOS was studied. It could be demonstrated that TNF-alpha and possibility GM-CSF, but not IL-1 and IL-3, enhanced the reactivation frequency and replication of HSV. Interferon alpha/beta (IFN alpha/beta) prevented reactivation and replication.

virusesmedicine.medical_treatmentHerpesvirus 1 HumanBiologymedicine.disease_causeVirus ReplicationVirusHerpesviridaeMiceInterferonVirologyAlphaherpesvirinaeChlorocebus aethiopsmedicineAnimalsHumansVero CellsMice Inbred BALB CTumor Necrosis Factor-alphaGranulocyte-Macrophage Colony-Stimulating FactorInterferon-alphaGeneral MedicineInterferon-betabiology.organism_classificationVirologyIn vitroVirus LatencyCytokineHerpes simplex virusViral replicationTrigeminal GanglionInterleukin-3Virus Activationmedicine.drugInterleukin-1Archives of virology
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct