Search results for "protocols"

showing 10 items of 782 documents

Polymorphisms in DNA repair genes modulate survival in cisplatin/gemcitabine-treated non-small-cell lung cancer patients.

2006

Abstract Background: Impaired DNA repair capacity may favorably affect survival in cisplatin/gemcitabine-treated non-small-cell lung cancer (NSCLC) patients. We investigated the association of survival with genetic polymorphisms in X-ray repair cross-complementing group 1 and group 3 (XRCC3), xeroderma pigmentosum group D (XPD), excision repair cross-complementing group 1, ligase IV, ribonucleotide reductase, TP53, cyclooxygenase-2, interleukin-6, peroxisome proliferator-activated receptor γ, epidermal growth factor, methylene-tetra-hydrofolate reductase and methionine synthase. Patients and methods: One hundred and thirty-five stage IV or IIIB (with malignant pleural effusion) NSCLC patien…

Xeroderma pigmentosumLung NeoplasmsDNA RepairGenotypeDeoxycytidineXRCC1Carcinoma Non-Small-Cell LungAntineoplastic Combined Chemotherapy ProtocolsmedicineHumansCisplatin; DNA repair genes; Gemcitabine; Non-small-cell lung cancer; Polymorphisms; XRCC3Lung cancerXRCC3Survival analysisCisplatinPolymorphism GeneticDNA repair genesbusiness.industryHazard ratioHematologymedicine.diseaseSurvival AnalysisGemcitabineGemcitabineOncologyCancer researchCisplatinbusinessPolymorphismsNon-small-cell lung cancerNucleotide excision repairmedicine.drugAnnals of oncology : official journal of the European Society for Medical Oncology
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments

2017

International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]mobility management protocolshandover latency[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSeamless vertical handover[INFO]Computer Science [cs][INFO] Computer Science [cs]IEEE 802.21 MIH
researchProduct

Actinic cheilitis: Proposal of a clinical index.

2021

Actinic cheilitis is a potentially malignant lesion most commonly found in the lower lip of individuals with chronic exposure to ultraviolet radiation. The aim of this study was to develop and to test a clinical index that can be used to assess the severity of actinic cheilitis. The clinical index of actinic cheilitis was applied to 36 patients. An incisional biopsy was obtained to grade oral epithelial dysplasias following the World Health Organization (WHO) and binary systems, and to evaluate their association with clinical characteristics by Fisher?s exact test (P<0.05). The accuracy of the index was evaluated based on sensitivity, specificity, positive and negative predictive values, an…

antineoplastic agentesHyperplasiaUltraviolet Raysantineoplastic combined chemotherapy protocolsneoplasmsLipstomatitismucositisOtorhinolaryngologyCheilitisLip NeoplasmsHumansSurgeryGeneral DentistryUNESCO:CIENCIAS MÉDICASMedicina oral, patologia oral y cirugia bucal
researchProduct

Relapse risk after autologous transplantation in patients with newly diagnosed myeloma is not related with infused tumor cell load and the outcome is…

2006

BACKGROUND AND OBJECTIVES: This European Group for Blood and Marrow Transplantation (EBMT) multicentre randomized phase III study was designed to assess the safety and efficacy of CD34+ selection in newly diagnosed myeloma patients undergoing autologous transplantation. DESIGN AND METHODS: One hundred and eleven patients responsive to initial chemotherapy were randomized to receive CD34+ selected (arm A) or unselected PBPC (arm B) after conditioning with high-dose melphalan and TBI. ASO-PCR was used to assess purging efficacy and reinfused tumor load. Tumor load could be assessed in 59 patients. RESULTS: CD34+ selection gave a median tumor cell depletion of 2.2 logs (0.77-5.96). No tumor ce…

autologous transplantMelphalanOncologyAdultMaleRiskmedicine.medical_specialtyTransplantation ConditioningAdolescentmedicine.medical_treatmentAntigens CD34Transplantation AutologousDexamethasoneDisease-Free SurvivalPostoperative ComplicationsRecurrenceInternal medicineAntineoplastic Combined Chemotherapy ProtocolsmedicineEuropean Group for Blood and Marrow TransplantatioAutologous transplantationHumansSurvival rateSurvival analysisMultiple myelomaAgedChemotherapyPeripheral Blood Stem Cell TransplantationHematologybusiness.industryBone Marrow PurgingHematologyCD34+ selectionMiddle Agedmedicine.diseasePrognosisSurvival AnalysisBone marrow purgingSurgerySurvival RateTreatment OutcomeDoxorubicinVincristineFemalebusinessMultiple Myelomamedicine.drugFollow-Up StudiesHaematologica
researchProduct

Neoadjuvant treatment for locally advanced unresectable and borderline resectable pancreatic cancer: oncological outcomes at a single academic centre.

2020

INTRODUCTION: Pancreatic cancer (PC), even in the absence of metastatic disease, has a dismal prognosis. One-third of them are borderline resectable (BRPC) or locally advanced unresectable PC (LAUPC) at diagnosis. There are limited prospective data supporting the best approach on these tumours. Neoadjuvant chemotherapy (ChT) is being increasingly used in this setting. METHODS: This is a retrospective series of consecutive patients staged as BRPC or LAUPC after discussion in the multidisciplinary board (MDB) at an academic centre. All received neoadjuvant ChT, followed by chemoradiation (ChRT) in some cases, and those achieving enough downstaging had a curative-intent surgery. Descriptive da…

borderline resectableCancer Researchmedicine.medical_specialtyFOLFIRINOXmedicine.medical_treatmentpancreatic cancerNeutropeniaAdenocarcinomalcsh:RC254-282Pancreatic cancerAntineoplastic Combined Chemotherapy ProtocolsmedicineHumansProspective Studies1506Neoadjuvant therapyRetrospective StudiesOriginal ResearchChemotherapybusiness.industrymedicine.diseaselcsh:Neoplasms. Tumors. Oncology. Including cancer and carcinogenslocally advanced unresectableNeoadjuvant TherapyOxaliplatinSurgeryIrinotecanPancreatic NeoplasmsFOLFIRINOXOncologyFluorouracilbusinessmedicine.drugESMO open
researchProduct

Wireless ATM : handover issues

1998

Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover solution relying on two inter-related handover protocols is presented and evaluated. Future research is needed to compare this solution with options presented by earlier research and possibly combine the…

cellular radioasynchronous transfer modeComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSprotocolsmultimedia communicationpacet radio networksradio ATMmultimedia servicesdigital cellular systemsATM transmission technologyhandover issuesdigital radiowireless ATMGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)mobile ATM
researchProduct

Cetuximab +/- chemotherapy enhances dendritic cell-mediated phagocytosis of colon cancer cells and ignites a highly efficient colon cancer antigen-sp…

2012

Cetuximab is a human/mouse chimeric IgG1 monoclonal antibody (mAb) to epidermal growth factor receptor, approved for colorectal carcinoma treatment in combination with chemotherapy. The immune-mediated effects elicited by its human fraction of crystallization moiety might critically contribute to the overall anti-tumor effectiveness of the antibody. We therefore investigated cetuximab ability to promote colon cancer cell opsonization and phagocytosis by human dendritic cells (DCs) that are subsequently engaged in antigen-cross presentation to cytotoxic T-lymphocyte (CTL) precursors. Human colon cancer cell lines were evaluated for susceptibility to DC-mediated phagocytosis before and after …

cetuximab; chemotherapy; danger signal; cytotoxic-T-lymphocytes; phagocytosisCancer ResearchColorectal cancerSettore MED/06 - Oncologia MedicaAntigen-Presenting CellsAntibodies Monoclonal Humanizedchemotherapydanger signalCross-PrimingAntigenAntigens NeoplasmCell Line TumorAntineoplastic Combined Chemotherapy ProtocolscetuximabHumansMedicineCytotoxic T cellCetuximabbusiness.industrySettore BIO/14Antibodies MonoclonalphagocytosisDendritic CellsDendritic cellmedicine.diseasecytotoxic-T-lymphocytedigestive system diseasesTumor antigenCTL*OncologyColonic NeoplasmsCancer cellImmunologyLeukocytes MononuclearCancer researchbusinessHT29 Cellscytotoxic-T-lymphocytesT-Lymphocytes Cytotoxicmedicine.drug
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

LPV model identification for gain scheduling control: An application to rotating stall and surge control problem

2006

Abstract We approach the problem of identifying a nonlinear plant by parameterizing its dynamics as a linear parameter varying (LPV) model. The system under consideration is the Moore–Greitzer model which captures surge and stall phenomena in compressors. The control task is formulated as a problem of output regulation at various set points (stable and unstable) of the system under inputs and states constraints. We assume that inputs, outputs and scheduling parameters are measurable. It is worth pointing out that the adopted technique allows for identification of an LPV model's coefficients without the requirements of slow variations amongst set points. An example of combined identification…

decentralized controlEngineeringbusiness.industryApplied MathematicsSystem identificationStall (fluid mechanics)Control engineeringconsensus protocolOptimal controlconsensus protocolsDecentralised systemComputer Science Applicationsoptimal controlNonlinear systemGain schedulingControl and Systems EngineeringControl theorynetworksSettore MAT/09 - Ricerca OperativaElectrical and Electronic EngineeringSurgebusinessSurge controlconsensus protocols; decentralized control; optimal control; networksControl Engineering Practice
researchProduct