Search results for "protocols"
showing 10 items of 782 documents
Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols
2015
LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of …
Abemaciclib: safety and effectiveness of a unique cyclin-dependent kinase inhibitor
2020
Introduction: The discovery and the clinical availability of novel cyclin-dependent kinases 4 and 6 inhibitors have profoundly changed the therapeutic scenario of metastatic hormone receptor-positive breast carcinoma. Among these inhibitors, abemaciclib can induce potent and sustained cell cycle arrest and immune system stimulation. Areas covered: This review summarizes the safety profile and clinical efficacy data on abemaciclib alone or in combination with aromatase inhibitors or fulvestrant in metastatic hormone receptor-positive breast carcinoma. The management of patients treated with abemaciclib is the object of this paper. Expert opinion: As shown in phase 2 and 3 clinical trials on …
Impact of Structural, Photochemical and Instrumental Effects on Leaf and Canopy Reflectance Variability in the 500–600 nm Range
2021
Current rapid technological improvement in optical radiometric instrumentation provides an opportunity to develop innovative measurements protocols where the remote quantification of the plant physiological status can be determined with higher accuracy. In this study, the leaf and canopy reflectance variability in the PRI spectral region (i.e., 500–600 nm) is quantified using different laboratory protocols that consider both instrumental and experimental set-up aspects, as well as canopy structural effects and vegetation photoprotection dynamics. First, we studied how an incorrect characterization of the at-target incoming radiance translated into an erroneous vegetation reflectance spectru…
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
H.264 QoS and Application Performance with Different Streaming Protocols
2015
Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed
ESSAI RANDOMISÉ POUR ÉVALUER L’EFFICACITÉ ET LA SÉCURITÉ DE TRAITEMENTS CHEZ DES PATIENTS AMBULATOIRES ATTEINTS DE COVID-19 AYANT DES FACTEURS DE RIS…
2021
Context. The Covid-19 pandemic is of unprecedented magnitude and has had major social and health consequences. Primary care professionals, mainly general practitioners, ensure the care of most patients with Covid-19. An early-stage treatment administered to patients with risk factors for developing a severe disease could reduce hospitalization and death rates. No treatment is currently validated in this indication. Objectives. To evaluate the safety and efficacy of experimental candidate agents delivered in outpatient settings to reduce the risk of hospitalization or death in at-risk patients with early-stage proven Covid-19 and no indication for hospital admission. Methods. Multicentric, o…
Comparison of inter-trial recovery times for the determination of critical power and W' in cycling
2017
Critical Power (CP) and W’ are often determined using multi-day testing protocols. To investigate this cumbersome testing method, the purpose of this study was to compare the differences between the conventional use of a 24-h inter-trial recovery time with those of 3 h and 30 min for the determination of CP and W’. Methods: 9 moderately trained cyclists performed an incremental test to exhaustion to establish the power output associated with the maximum oxygen uptake (p V O2max), and 3 protocols requiring time-to-exhaustion trials at a constant work-rate performed at 80%, 100% and 105% of p VO2max. Design: Protocol A utilised 24-h inter-trial recovery (CP24/W’24), protocol B utilised 3-h in…
A framework for Population Protocols in VANETs
2023
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
Underwater Multirobot Cooperative Intervention MAC Protocol
2020
This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…