-
981
LSVT as a fundamental therapeutic technique for improving voice in parkinsonism: Evidence from three cases
Published 2024-12-01“…It is very important to pool the evidence obtained from the patients to understand the effectiveness of the technique. …”
Get full text
Article -
982
New method of text representation model based on neural network
Published 2017-04-01“…Method of text representation model was proposed to extract word-embedding from text feature.Firstly,the word-embedding of the dual word-embedding list based on dictionary index and the corresponding part of speech index was created.Then,feature vectors was obtained further from these extracted word-embeddings by using Bi-LSTM recurrent neural network.Finally,the sentence vectors were processed by mean-pooling layer and text categorization was classified by softmax layer.The training effects and extraction performance of the combination model of Bi-LSTM and double word-embedding neural network were verified.The experimental results show that this model not only performs well in dealing with the high-quality text feature vector and the expression sequence,but also significantly outperforms other three kinds of neural networks,which includes LSTM,LSTM+context window and Bi-LSTM.…”
Get full text
Article -
983
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
984
Next-generation sequencing protocol of hematopoietic stem cells (HSCs). Step-by-step overview and troubleshooting guide.
Published 2025-01-01“…Populations of very small embryonic-like stem cells (VSELs) (CD34+lin-CD45- and CD133+lin-CD45-), circulating in the peripheral blood of adults in small numbers, have been identified in several human tissues and together with the populations of hematopoietic stem cells (HSCs) (CD34+lin-CD45+) and CD133+lin-CD45+constitute a pool of cells with self-renewal and pluripotent stem cell characteristics. …”
Get full text
Article -
985
Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security
Published 2023-01-01“…In view of the increasingly concealed,complicated,and intelligent network attacks,this paper analyzes the security protection status and network security problems faced by the water conservancy network.A cooperative defense system of water conservancy network security is proposed,and a cooperative defense control system of network security is designed according to the system.On the basis of software defined security architecture,the control layer and security layer of traditional hardware or virtualized security devices are separated.The security resource pool provides security protection,and the security control platform is responsible for management and command delivery.Furthermore,security services can be arranged according to different protection requirements to construct multiple security protection mechanisms,so as to provide technical support for realizing the cooperative defense capability of water conservancy network security featuring internal and external cooperation and linkage between the upper and lower levels.…”
Get full text
Article -
986
mSphere of Influence: How the single cell contributes to the collective
Published 2025-01-01“…Tavazoie (Nat Microbiol 5:1192–1201, 2020, https://doi.org/10.1038/s41564-020-0729-6) and “Microbial single-cell RNA sequencing by split-pool barcoding” by A. Kuchina, L. M. Brettner, L. …”
Get full text
Article -
987
Research on the development and business trend of holographic technology under 6G network
Published 2021-11-01“…Research on 6G has been carried out on a global scale.Focusing on holographic interactive services under 6G, the requirements for future network performance by studying holographic interactive scenarios and services were analyzed.A basis for business requirements for the design and research and technological evolution of 6G networks was provided.The holographic technology and application status, holographic communication and holographic interaction scenarios, as well as the technical indicators and network performance requirements of the scene business were studied.The holographic technology development stage, development maturity, holographic industry chain under 5G, and holographic technology application field distribution were defined.A holographic scene pool and scene characteristics were constructed, and six types of application scenes were formed based on the characteristics.Through the calculation of technical indicators, the bandwidth performance requirements of holographic portrait transmission were proposed.…”
Get full text
Article -
988
Study on virtual computing resource scheduling for network performance optimization
Published 2016-08-01“…A deep insight into the relationship between vCPU scheduling and I/O transmit in Xen was provided.Then an effective and lightweight recognition method,through which could identify the so-called NSVM (network queuing sensi-tive virtual machine) that was more vulnerable to the congestion in I/O transmit was put forward.Furthermore,a novel mechanism for resource assignment and scheduling called Diff-Scheduler was proposed.It could schedule the vCPU of the NSVM more frequently than other VM in different pools independently.Evaluations based on a prototype of Xen platform featured Diff-Scheduler show that the proposed mechanism significantly improves the network performance of VM.Specifically,comparing with the default mechanism of Xen,Diff-Scheduler proposed jointly enhances throughput,latency remarkably and ensures the fairness of resource allocation at the same time.…”
Get full text
Article -
989
Impact de la géographie sur la biodémographie ?
Published 2002-06-01“…For the spouse, similarity is the most important element in his choice, whereas for kinship there is a strong dichotomy, as the “mountain” towns have a much more homogenous gene pool. Finally, in this province altitude is less a factor of geographic isolation than an important element in the biological closure of the urban populations.…”
Get full text
Article -
990
Hurricane Toads
Published 2020-06-01“…Following torrential rains they emerge from hiding and breed in shallow pools. In as little as 14 days, hordes of raisin-sized froglets emerge and hop away in all directions from the pond or puddle where they were born. …”
Get full text
Article -
991
Time and replacement among the Q’eqchi’ Maya
Published 2017-12-01“…For example, one man may substitute his labor for another man’s labor insofar as men have similar degrees of strength and skill, and insofar as a position in a labor-pool must be filled. In this paper, I explore the relation between replacement, as an idea and institution, and ‘lived time’. …”
Get full text
Article -
992
Underwater acoustic OFDM channel equalization based on virtual time reversal mirror
Published 2015-01-01“…To solve the problem of the severe inter-symbol interference of orthogonal frequency division multiplexing (OFDM) communication caused by underwater acoustic multipath channel,a virtual time reversal channel equalization scheme was proposed.VTRM was able to shorten the channel impulse response and alleviate the phase distortion caused by the acoustic channel for its characteristic of the temporal compression and phase conjugation in frequency domain.The matching pursuit (MP) algorithm was applied to estimate the channel impulse response which could estimate the channel amplitude,time delay and phase accurately.It provided the channel information for the VTRM channel equalization.It also improved a lot compared to the traditional matching correlation channel estimation method which couldn't estimate the channel phase and the estimation precision was low.The simulation,pool trail and Songhua lake experiment show that the performance of VTRM channel equalization is better than that of the PTRM and LS channel equalization in the OFDM underwater acoustic communication.…”
Get full text
Article -
993
Research on endogenous security data sharing mechanism of F-RAN for 6G
Published 2021-01-01“…In order to solve the data security problem of data sharing in the fog radio access network in the 6G mobile communication system, an endogenous secure data sharing mechanism that realized local differential privacy and dynamic batch auditing was proposed.First, the user ran the RAPPOR algorithm locally on the data to protect data privacy.Next, the fog access point cached and preprocessed the data.Then the high power node performed a data integrity audit based on the BLS signature and Merkle hash tree on the data cached on the fog access point.Finally, the BBU pool infered the original distribution of shared data through statistical analysis.Security analysis and simulation show that the proposed mechanism realizes the local differential privacy of users, supports secure multi-client batch audit and data dynamic operation, and has high efficiency in time, space and communication.…”
Get full text
Article -
994
A millennium of cold and humid climate decreased carbon accumulation in the subtropical monsoon peatland
Published 2025-01-01“…This suggests that the risk of carbon release from the peatland carbon pool under natural climate change conditions is not substantial in the subtropical monsoon area.…”
Get full text
Article -
995
RYE CHROMATIN INTROGRESSION IN THE BREAD WHEAT GENOME: CYTOGENETIC ASPECTS
Published 2015-01-01“…Alien chromatin introgression into the genome of common wheat Triticum aestivum L. is the most efficient way to enrich the gene pool of this crop. To improve the breeding value of wheat accessions, rye Secale cereale L is used as a donor of characters. …”
Get full text
Article -
996
Carbon fluxes in soil systems supplemented with glucose and cadmium
Published 2017-12-01“…The introduction of heavy metals into the soil has reduced the carbon flux rate through the soluble carbon pool, but has left the microbial biomass carbon unaffected. …”
Get full text
Article -
997
Computerized Tomography Technique for the Investigation of the Maxillary First Molar Mesiobuccal Root
Published 2013-01-01“…Frequencies of the presence of second mesiobuccal canal and root anatomy characteristics were extracted from the selected studies. Pooled frequencies were calculated as weighted means. …”
Get full text
Article -
998
Vertical Phosphorus Migration in a Biosolids-Amended Sandy Loam Soil in Laboratory Settings: Concentrations in Soils and Leachates
Published 2016-01-01“…Over five months, these amended soil samples from two different depths were sequentially fractionated to determine various inorganic and organic phosphorus pools in order to evaluate phosphorus vertical migration within a soil profile. …”
Get full text
Article -
999
Temperature Control of Quartz-Glass Melting Areas in Laser Additive Manufacturing
Published 2024-12-01“…A closed-loop temperature control system was designed and built for the molten pool temperature in quartz-glass additive manufacturing. …”
Get full text
Article -
1000
Quantifying Uncertainty of Insurance Claims Based on Expert Judgments
Published 2025-01-01“…The elicitation protocol used in this study was The Sheffield Elicitation Framework (SHELF), which produces four different statistical distributions for each expert. A linear pooling method was used to aggregate the distributions to obtain the consensus distribution among experts. …”
Get full text
Article