Search results for "protocols"

showing 10 items of 782 documents

Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols

2015

LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of …

radio linksaccess protocolscellular radioSettore ING-INF/03 - Telecomunicazionibusiness.industryOrthogonal frequency-division multiplexingComputer science4G mobile communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerHybrid automatic repeat requestComputer architectureTelecommunications linkLong Term EvolutionLTE MAC CQI AMC HARQ throughput analysis.Isolation (database systems)Radio resource managementbusinessThroughput (business)Computer networkCommunication channel2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

Abemaciclib: safety and effectiveness of a unique cyclin-dependent kinase inhibitor

2020

Introduction: The discovery and the clinical availability of novel cyclin-dependent kinases 4 and 6 inhibitors have profoundly changed the therapeutic scenario of metastatic hormone receptor-positive breast carcinoma. Among these inhibitors, abemaciclib can induce potent and sustained cell cycle arrest and immune system stimulation. Areas covered: This review summarizes the safety profile and clinical efficacy data on abemaciclib alone or in combination with aromatase inhibitors or fulvestrant in metastatic hormone receptor-positive breast carcinoma. The management of patients treated with abemaciclib is the object of this paper. Expert opinion: As shown in phase 2 and 3 clinical trials on …

safetyAminopyridinesBreast Neoplasms030204 cardiovascular system & hematology03 medical and health scienceschemistry.chemical_compoundabemaciclib breast cancer metastases hormonal receptors safetybreast cancer0302 clinical medicineBreast cancerCyclin-dependent kinaseAntineoplastic Combined Chemotherapy ProtocolsmedicineHumansPharmacology (medical)metastasesskin and connective tissue diseasesFulvestrantProtein Kinase InhibitorsAbemaciclibbiologyAromatase Inhibitorsbusiness.industryKinasehormonal receptorsCyclin-Dependent Kinase 4Cell Cycle CheckpointsCyclin-Dependent Kinase 6General Medicinemedicine.diseaseAbemaciclibchemistry030220 oncology & carcinogenesisQuality of LifeCancer researchbiology.proteinBenzimidazolesFemalesense organsbusinessHormone
researchProduct

Impact of Structural, Photochemical and Instrumental Effects on Leaf and Canopy Reflectance Variability in the 500–600 nm Range

2021

Current rapid technological improvement in optical radiometric instrumentation provides an opportunity to develop innovative measurements protocols where the remote quantification of the plant physiological status can be determined with higher accuracy. In this study, the leaf and canopy reflectance variability in the PRI spectral region (i.e., 500–600 nm) is quantified using different laboratory protocols that consider both instrumental and experimental set-up aspects, as well as canopy structural effects and vegetation photoprotection dynamics. First, we studied how an incorrect characterization of the at-target incoming radiance translated into an erroneous vegetation reflectance spectru…

spectroscopyreflectanceproximal sensing; spectroscopy; protocols; irradiance; reflectance; vegetation index; sun-/shade-adapted leaves; xanthophyll cycleirradianceScienceQGeneral Earth and Planetary Sciencesprotocolsproximal sensingvegetation indexRemote Sensing
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct

H.264 QoS and Application Performance with Different Streaming Protocols

2015

Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed

ta113Protocol (science)HLSbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceReal-time computingstreaming protocolsQoSFrame rateRTSPTest sequenceUser experience designRTMPReal Time Streaming ProtocolQoEH.264businesscomputerComputer networkProceedings of the 8th International Conference on Mobile Multimedia Communications
researchProduct

ESSAI RANDOMISÉ POUR ÉVALUER L’EFFICACITÉ ET LA SÉCURITÉ DE TRAITEMENTS CHEZ DES PATIENTS AMBULATOIRES ATTEINTS DE COVID-19 AYANT DES FACTEURS DE RIS…

2021

Context. The Covid-19 pandemic is of unprecedented magnitude and has had major social and health consequences. Primary care professionals, mainly general practitioners, ensure the care of most patients with Covid-19. An early-stage treatment administered to patients with risk factors for developing a severe disease could reduce hospitalization and death rates. No treatment is currently validated in this indication. Objectives. To evaluate the safety and efficacy of experimental candidate agents delivered in outpatient settings to reduce the risk of hospitalization or death in at-risk patients with early-stage proven Covid-19 and no indication for hospital admission. Methods. Multicentric, o…

treatment[SDV]Life Sciences [q-bio]protocolstrialInternalcontrolledclinical[SDV] Life Sciences [q-bio]earlyrandomizedoutpatientMedicineGeneralCovid-19
researchProduct

Comparison of inter-trial recovery times for the determination of critical power and W' in cycling

2017

Critical Power (CP) and W’ are often determined using multi-day testing protocols. To investigate this cumbersome testing method, the purpose of this study was to compare the differences between the conventional use of a 24-h inter-trial recovery time with those of 3 h and 30 min for the determination of CP and W’. Methods: 9 moderately trained cyclists performed an incremental test to exhaustion to establish the power output associated with the maximum oxygen uptake (p V O2max), and 3 protocols requiring time-to-exhaustion trials at a constant work-rate performed at 80%, 100% and 105% of p VO2max. Design: Protocol A utilised 24-h inter-trial recovery (CP24/W’24), protocol B utilised 3-h in…

validityTime FactorsTime Factorpower-duration relationshipPhysical Therapy Sports Therapy and RehabilitationAthletic Performance030204 cardiovascular system & hematology03 medical and health sciencesRecovery periodOxygen Consumption0302 clinical medicineAnimal scienceTesting protocolsHumansOrthopedics and Sports MedicinePower outputSimulationMathematicsexercise testingLimits of agreementVO2 max030229 sport sciencesQPIncremental testBicyclinganaerobic work capacityCritical intensityMuscle FatigueCritical powerExercise TestCyclingGVHuman
researchProduct

A framework for Population Protocols in VANETs

2023

vanetpopulation protocols
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Underwater Multirobot Cooperative Intervention MAC Protocol

2020

This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…

wireless networksaccess protocolsGeneral Computer ScienceComputer scienceUnderwater communicationsEnd-to-end delayTime division multiple accessThroughput02 engineering and technologyteleroboticsTelecomunicació0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceJitterbusiness.industryNetwork packetWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsApplication layerunderwater communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringremotely operated vehiclesbusinessCommunications protocolRobotsProtocols de xarxes d'ordinadorslcsh:TK1-9971Underwater acoustic communicationComputer networkCommunication channelIEEE Access
researchProduct