Search results for "Protocol"

showing 10 items of 1808 documents

Actinic cheilitis: Proposal of a clinical index.

2021

Actinic cheilitis is a potentially malignant lesion most commonly found in the lower lip of individuals with chronic exposure to ultraviolet radiation. The aim of this study was to develop and to test a clinical index that can be used to assess the severity of actinic cheilitis. The clinical index of actinic cheilitis was applied to 36 patients. An incisional biopsy was obtained to grade oral epithelial dysplasias following the World Health Organization (WHO) and binary systems, and to evaluate their association with clinical characteristics by Fisher?s exact test (P<0.05). The accuracy of the index was evaluated based on sensitivity, specificity, positive and negative predictive values, an…

antineoplastic agentesHyperplasiaUltraviolet Raysantineoplastic combined chemotherapy protocolsneoplasmsLipstomatitismucositisOtorhinolaryngologyCheilitisLip NeoplasmsHumansSurgeryGeneral DentistryUNESCO:CIENCIAS MÉDICASMedicina oral, patologia oral y cirugia bucal
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards &amp; Interfaces
researchProduct

Relapse risk after autologous transplantation in patients with newly diagnosed myeloma is not related with infused tumor cell load and the outcome is…

2006

BACKGROUND AND OBJECTIVES: This European Group for Blood and Marrow Transplantation (EBMT) multicentre randomized phase III study was designed to assess the safety and efficacy of CD34+ selection in newly diagnosed myeloma patients undergoing autologous transplantation. DESIGN AND METHODS: One hundred and eleven patients responsive to initial chemotherapy were randomized to receive CD34+ selected (arm A) or unselected PBPC (arm B) after conditioning with high-dose melphalan and TBI. ASO-PCR was used to assess purging efficacy and reinfused tumor load. Tumor load could be assessed in 59 patients. RESULTS: CD34+ selection gave a median tumor cell depletion of 2.2 logs (0.77-5.96). No tumor ce…

autologous transplantMelphalanOncologyAdultMaleRiskmedicine.medical_specialtyTransplantation ConditioningAdolescentmedicine.medical_treatmentAntigens CD34Transplantation AutologousDexamethasoneDisease-Free SurvivalPostoperative ComplicationsRecurrenceInternal medicineAntineoplastic Combined Chemotherapy ProtocolsmedicineEuropean Group for Blood and Marrow TransplantatioAutologous transplantationHumansSurvival rateSurvival analysisMultiple myelomaAgedChemotherapyPeripheral Blood Stem Cell TransplantationHematologybusiness.industryBone Marrow PurgingHematologyCD34+ selectionMiddle Agedmedicine.diseasePrognosisSurvival AnalysisBone marrow purgingSurgerySurvival RateTreatment OutcomeDoxorubicinVincristineFemalebusinessMultiple Myelomamedicine.drugFollow-Up StudiesHaematologica
researchProduct

Neoadjuvant treatment for locally advanced unresectable and borderline resectable pancreatic cancer: oncological outcomes at a single academic centre.

2020

INTRODUCTION: Pancreatic cancer (PC), even in the absence of metastatic disease, has a dismal prognosis. One-third of them are borderline resectable (BRPC) or locally advanced unresectable PC (LAUPC) at diagnosis. There are limited prospective data supporting the best approach on these tumours. Neoadjuvant chemotherapy (ChT) is being increasingly used in this setting. METHODS: This is a retrospective series of consecutive patients staged as BRPC or LAUPC after discussion in the multidisciplinary board (MDB) at an academic centre. All received neoadjuvant ChT, followed by chemoradiation (ChRT) in some cases, and those achieving enough downstaging had a curative-intent surgery. Descriptive da…

borderline resectableCancer Researchmedicine.medical_specialtyFOLFIRINOXmedicine.medical_treatmentpancreatic cancerNeutropeniaAdenocarcinomalcsh:RC254-282Pancreatic cancerAntineoplastic Combined Chemotherapy ProtocolsmedicineHumansProspective Studies1506Neoadjuvant therapyRetrospective StudiesOriginal ResearchChemotherapybusiness.industrymedicine.diseaselcsh:Neoplasms. Tumors. Oncology. Including cancer and carcinogenslocally advanced unresectableNeoadjuvant TherapyOxaliplatinSurgeryIrinotecanPancreatic NeoplasmsFOLFIRINOXOncologyFluorouracilbusinessmedicine.drugESMO open
researchProduct

Design and implementation of a long-range low-power wake-up radio and customized DC-MAC protocol for LoRaWAN

2019

In this paper, we present the design and implementation of a long-rage wake-up radio (WuR) and customized duty cycled (DC) MAC protocol for wireless IoT devices. The WuRx achieves a sensivity of −70 dBm by consuming just 0.032 mA, thereby optimizing the energy consumption of battery powered long-range wireless IoT devices. Reducing the power consumption of these devices minimizes the overall costs when deployed in large scale.

business.industryComputer science05 social sciencesBattery (vacuum tube)050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionPower (physics)0508 media and communicationsPower consumptionEmbedded systemRange (aeronautics)0202 electrical engineering electronic engineering information engineeringWirelessbusinessInternet of ThingsProtocol (object-oriented programming)2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
researchProduct

Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]

2009

This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.

business.industryComputer scienceApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSignal ProcessingWireless lanThroughputMobile telephonyElectrical and Electronic EngineeringbusinessGame theoryProtocol (object-oriented programming)Computer networkIEEE Signal Processing Magazine
researchProduct

Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks

2018

Wake-up Radios (WuRs) are becoming more popular in Internet of Things (IoT) networks owing to their overwhelming advantages such as low latency, high energy saving, and on-demand communication. In a multi-hop WuR-IoT network, route establishment between source and destination prior to actual data communications consumes a significant portion of energy. To reduce energy consumption and protocol overhead for route establishment, we propose a lightweight relay (LR) selection scheme, referred to as LR-WuR, where a lookup table and acknowledgment are used for next hop relay selection. We develop an analytical model to evaluate the performance of LR-WuR. Extensive simulations are performed to val…

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyEnergy consumptionWakelaw.inventionHop (networking)Protocol overheadRelaylaw0202 electrical engineering electronic engineering information engineeringbusinessInternet of ThingsComputer network2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems

2009

In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…

business.industryComputer scienceDVB-HMobile televisionReal-time computingData_CODINGANDINFORMATIONTHEORYApplication layerlaw.inventionlawInternet ProtocolDigital Video BroadcastingMedia TechnologyLink layerForward error correctionElectrical and Electronic EngineeringbusinessAccess timeComputer networkIEEE Transactions on Broadcasting
researchProduct

Effects of Topic Familiarity on Analogical Transfer in Problem-Solving: A Think-Aloud Study of Two Singular Cases

2015

We conducted a qualitative research of case studies based on think-aloud protocols. The aim was to carry out in-depth analyse secondary students¿ cognitive difficulties appearing in early stages of transfer processes in problem-solving. The task was to relate several source problems to a target problem, in order to solve it effectively. Source and target problems had different Surface and/or Structural similarities. In this paper, the solvers¿ high or low Familiarity with the problem stories on transfer processes was also focused on. Two emergent instructional phenomena are described, both associated to specific students¿ cognitive obstacles to achieve success in solving the target problem:…

business.industryComputer scienceLogical reasoningApplied MathematicsSisyphus effectProtocol analysisCognitionSolució de problemesMatemàtica EnsenyamentCiència EnsenyamentEducationTask (project management)Task analysisArtificial intelligencebusinessThink aloud protocolQualitative researchCognitive psychology
researchProduct

An Agents and Artifacts Approach to Distributed Data Mining

2013

This paper proposes a novel Distributed Data Mining (DDM) approach based on the Agents and Artifacts paradigm, as implemented in CArtAgO [9], where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to decision trees built with J48, but the approach is flexible enough to allow different kinds of learning models. The twofold contribution of this work includes: i) JaCA-DDM: an extensible tool implemented in the agent oriented programming language Jason [2] and CArtAgO [10,9] to experiment DDM agent-based approaches on different, well known training sets. A…

business.industryComputer scienceMulti-agent systemDecision treeCollaborative learningcomputer.software_genreMachine learningC4.5 algorithmData miningArtificial intelligencebusinesscomputerProtocol (object-oriented programming)Agent-oriented programmingCounterexample
researchProduct