细胞和基因治疗(Cell and Gene Therapy,简称CGT)近年来获得快速发展。由于CGT的起始物料差异大,工艺流程具有特异性等特点,造成研发数据完整性合规难度大等的问题。文章介绍了一种根据CGT研发特点而开发的计算机化系统:它整合了电子实...细胞和基因治疗(Cell and Gene Therapy,简称CGT)近年来获得快速发展。由于CGT的起始物料差异大,工艺流程具有特异性等特点,造成研发数据完整性合规难度大等的问题。文章介绍了一种根据CGT研发特点而开发的计算机化系统:它整合了电子实验记录本(ELN)及部分实验室信息管理系统(LIMS)的功能,可最大程度确保研发人员的操作、记录符合GMP规范,确保研发数据真实可靠,符合数据完整性和新药申报要求。展开更多
Transmission Control Protocol (TCP) was originally designed for wired networks. Many compatibility problems exist when it is applied to wireless environments, and hence it needs to undergo modifications. Currently, th...Transmission Control Protocol (TCP) was originally designed for wired networks. Many compatibility problems exist when it is applied to wireless environments, and hence it needs to undergo modifications. Currently, there are several TCP performance enhancement techniques for application of TCP in wireless environments, but all of them conflict with IPsec. This paper not only analyzes these conflicts, but also proposes 4 solutions: replacing IPsec with Transport Layer Security/Secure Socket Layer (TLS/SSL) protocol, adopting the extended Encapsulating Security Payload (ESP) protocol, segmenting the TCP route, and modifying the end-to-end protection mode of IPsec. It also presents their strengths and weaknesses.展开更多
文摘细胞和基因治疗(Cell and Gene Therapy,简称CGT)近年来获得快速发展。由于CGT的起始物料差异大,工艺流程具有特异性等特点,造成研发数据完整性合规难度大等的问题。文章介绍了一种根据CGT研发特点而开发的计算机化系统:它整合了电子实验记录本(ELN)及部分实验室信息管理系统(LIMS)的功能,可最大程度确保研发人员的操作、记录符合GMP规范,确保研发数据真实可靠,符合数据完整性和新药申报要求。
文摘Transmission Control Protocol (TCP) was originally designed for wired networks. Many compatibility problems exist when it is applied to wireless environments, and hence it needs to undergo modifications. Currently, there are several TCP performance enhancement techniques for application of TCP in wireless environments, but all of them conflict with IPsec. This paper not only analyzes these conflicts, but also proposes 4 solutions: replacing IPsec with Transport Layer Security/Secure Socket Layer (TLS/SSL) protocol, adopting the extended Encapsulating Security Payload (ESP) protocol, segmenting the TCP route, and modifying the end-to-end protection mode of IPsec. It also presents their strengths and weaknesses.