Search results for "Protocol"
showing 10 items of 1808 documents
Actinic cheilitis: Proposal of a clinical index.
2021
Actinic cheilitis is a potentially malignant lesion most commonly found in the lower lip of individuals with chronic exposure to ultraviolet radiation. The aim of this study was to develop and to test a clinical index that can be used to assess the severity of actinic cheilitis. The clinical index of actinic cheilitis was applied to 36 patients. An incisional biopsy was obtained to grade oral epithelial dysplasias following the World Health Organization (WHO) and binary systems, and to evaluate their association with clinical characteristics by Fisher?s exact test (P<0.05). The accuracy of the index was evaluated based on sensitivity, specificity, positive and negative predictive values, an…
Decision-cache based XACML authorisation and anonymisation for XML documents
2012
Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…
Relapse risk after autologous transplantation in patients with newly diagnosed myeloma is not related with infused tumor cell load and the outcome is…
2006
BACKGROUND AND OBJECTIVES: This European Group for Blood and Marrow Transplantation (EBMT) multicentre randomized phase III study was designed to assess the safety and efficacy of CD34+ selection in newly diagnosed myeloma patients undergoing autologous transplantation. DESIGN AND METHODS: One hundred and eleven patients responsive to initial chemotherapy were randomized to receive CD34+ selected (arm A) or unselected PBPC (arm B) after conditioning with high-dose melphalan and TBI. ASO-PCR was used to assess purging efficacy and reinfused tumor load. Tumor load could be assessed in 59 patients. RESULTS: CD34+ selection gave a median tumor cell depletion of 2.2 logs (0.77-5.96). No tumor ce…
Neoadjuvant treatment for locally advanced unresectable and borderline resectable pancreatic cancer: oncological outcomes at a single academic centre.
2020
INTRODUCTION: Pancreatic cancer (PC), even in the absence of metastatic disease, has a dismal prognosis. One-third of them are borderline resectable (BRPC) or locally advanced unresectable PC (LAUPC) at diagnosis. There are limited prospective data supporting the best approach on these tumours. Neoadjuvant chemotherapy (ChT) is being increasingly used in this setting. METHODS: This is a retrospective series of consecutive patients staged as BRPC or LAUPC after discussion in the multidisciplinary board (MDB) at an academic centre. All received neoadjuvant ChT, followed by chemoradiation (ChRT) in some cases, and those achieving enough downstaging had a curative-intent surgery. Descriptive da…
Design and implementation of a long-range low-power wake-up radio and customized DC-MAC protocol for LoRaWAN
2019
In this paper, we present the design and implementation of a long-rage wake-up radio (WuR) and customized duty cycled (DC) MAC protocol for wireless IoT devices. The WuRx achieves a sensivity of −70 dBm by consuming just 0.032 mA, thereby optimizing the energy consumption of battery powered long-range wireless IoT devices. Reducing the power consumption of these devices minimizes the overall costs when deployed in large scale.
Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]
2009
This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.
Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks
2018
Wake-up Radios (WuRs) are becoming more popular in Internet of Things (IoT) networks owing to their overwhelming advantages such as low latency, high energy saving, and on-demand communication. In a multi-hop WuR-IoT network, route establishment between source and destination prior to actual data communications consumes a significant portion of energy. To reduce energy consumption and protocol overhead for route establishment, we propose a lightweight relay (LR) selection scheme, referred to as LR-WuR, where a lookup table and acknowledgment are used for next hop relay selection. We develop an analytical model to evaluate the performance of LR-WuR. Extensive simulations are performed to val…
Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems
2009
In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…
Effects of Topic Familiarity on Analogical Transfer in Problem-Solving: A Think-Aloud Study of Two Singular Cases
2015
We conducted a qualitative research of case studies based on think-aloud protocols. The aim was to carry out in-depth analyse secondary students¿ cognitive difficulties appearing in early stages of transfer processes in problem-solving. The task was to relate several source problems to a target problem, in order to solve it effectively. Source and target problems had different Surface and/or Structural similarities. In this paper, the solvers¿ high or low Familiarity with the problem stories on transfer processes was also focused on. Two emergent instructional phenomena are described, both associated to specific students¿ cognitive obstacles to achieve success in solving the target problem:…
An Agents and Artifacts Approach to Distributed Data Mining
2013
This paper proposes a novel Distributed Data Mining (DDM) approach based on the Agents and Artifacts paradigm, as implemented in CArtAgO [9], where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to decision trees built with J48, but the approach is flexible enough to allow different kinds of learning models. The twofold contribution of this work includes: i) JaCA-DDM: an extensible tool implemented in the agent oriented programming language Jason [2] and CArtAgO [10,9] to experiment DDM agent-based approaches on different, well known training sets. A…