Search results for "block"
showing 7 items of 1177 documents
Age of Information Based URLLC-enabled UAV Wireless Communications System
2022
This paper considers an unmanned aerial vehicles (UAV) communication network, where UAV operate as an aerial mobile relay between a source and a destination of the network. To capture the “timelines” of the received information at the destination node, a new performance metric named age of information (AoI) is considered. In addition, a short packet communication scheme maintains low latency in the proposed UAV wireless communication system. The finite block-length theory investigates the performances of short packet communications scheme in the UAV-assisted wireless communications system. In this paper, the Average Age of Information (AAoI) is estimated by applying the Stochastic Hybrid Sy…
2020 ESC Guidelines for the management of acute coronary syndromes in patients presenting without persistent ST-segment elevation
2020
2020 ESC Guidelines for the management of acute coronary syndromes in patients presenting without persistent ST-segment elevation
Could PD-1/PDL1 immune checkpoints be linked to HLA signature?
2019
The outstanding clinical expansion of monoclonal antibodies (mAbs) to programmed cell death receptor-1 (PD-1) (nivolumab and pembrolizumab) and PD-1 ligand-1 (PDL-1) (atezolizumab, avelumab and durvalumab) has received an increasing level of interest regarding immunotherapy and multidrug combinations, for the treatment of a number of common human malignancies. Some patients treated with these agents receive remarkable benefits in term of quality of life, progression-free (PFS) and overall survival (OS). However, a significant percentage of these patients experience immune-related adverse events (irAEs), while others present with an ultra-rapid disease progression, defined as hyperprogressio…
Neuronal effects of Sugammadex in combination with Rocuronium or Vecuronium.
2017
Rocuronium (ROC) and Vecuronium (VEC) are the most currently used steroidal non-depolarizing neuromuscular blocking (MNB) agents. Sugammadex (SUG) rapidly reverses steroidal NMB agents after anaesthesia. The present study was conducted in order to evaluate neuronal effects of SUG alone and in combination with both ROC and VEC. Using MTT, CASP-3 activity and Western-blot we determined the toxicity of SUG, ROC or VEC in neurons in primary culture. SUG induces apoptosis/necrosis in neurons in primary culture and increases cytochrome C (CytC), apoptosis-inducing factor (AIF), Smac/Diablo and Caspase 3 (CASP-3) protein expression. Our results also demonstrated that both ROC and VEC prevent these…
Sensitivity Analysis and Frequency Dynamics of Grid-Connected Converters with Virtual Inertia
2021
For the participation in the frequency control of the system, power converters can be controlled with different strategies and methods, sharing the common concept of virtual inertia capability. In this work, a sensitivity analysis of two main categories of converter controls with virtual inertia is presented. The considered schemes are a grid-following current vector control with additional virtual inertia block and a grid-forming control scheme based on virtual synchronous machine concept. A proper basis for the comparison is first assessed providing an analytical correlation between the control parameters of the two schemes. For the two control strategies, the sensitivity analysis of the …
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
On-Demand Security Framework for 5GB Vehicular Networks
2023
Building accurate Machine Learning (ML) at-tack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model’s security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trustedinteractions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an ef…