-
701
A Case of Yersinia Infection from the Middle East: Case Report and Literature Review
Published 1991-01-01“…The case is unique in that the cecum was affected while the terminal ileum was free from disease.…”
Get full text
Article -
702
Node selection method in federated learning based on deep reinforcement learning
Published 2021-06-01“…To cope with the impact of different device computing capabilities and non-independent uniformly distributed data on federated learning performance, and to efficiently schedule terminal devices to complete model aggregation, a method of node selection based on deep reinforcement learning was proposed.It considered training quality and efficiency of heterogeneous terminal devices, and filtrate malicious nodes to guarantee higher model accuracy and shorter training delay of federated learning.Firstly, according to characteristics of model distributed training in federated learning, a node selection system model based on deep reinforcement learning was constructed.Secondly, considering such factors as device training delay, model transmission delay and accuracy, an optimization model of accuracy for node selection was proposed.Finally, the problem model was constructed as a Markov decision process and a node selection algorithm based on distributed proximal strategy optimization was designed to obtain a reasonable set of devices before each training iteration to complete model aggregation.Simulation results demonstrate that the proposed method significantly improves the accuracy and training speed of federated learning, and its convergence and robustness are also well.…”
Get full text
Article -
703
Nurses' Psychosocial Barriers to Suicide Risk Management
Published 2011-01-01“…Justifications for euthanasia included poor symptom control, poor quality of life, incurable illness or permanent disability, terminal illness, and terminal illness with inadequate symptom control or impending death, patient autonomy, and clinical organ death. …”
Get full text
Article -
704
Cooperative inference analysis based on DNN convolutional kernel partitioning
Published 2022-12-01“…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
Get full text
Article -
705
Berth Allocation and Quay Crane Assignment Considering the Uncertain Maintenance Requirements
Published 2025-01-01“…The strategic optimization of a container terminal’s quayside assets, including the berth and quay cranes, is crucial for maximizing their deployment and utilization. …”
Get full text
Article -
706
Novel Interecting Blends Based on Amino Terminited Oligoimides by Using Michael Addition Reaction-II
Published 2012-01-01“…AOIs were then treated with acrylol chloride and resultant acryl terminated oligoimides (AcOIs) samples were also characterized thermogravimetrically. …”
Get full text
Article -
707
Effect of His-Tag on Expression, Purification, and Structure of Zinc Finger Protein, ZNF191(243-368)
Published 2016-01-01“…Our findings suggest that insertion of a His-tag at the N-terminal or C-terminal end of ZNF191(243-368) has different effects on the protein. …”
Get full text
Article -
708
Midregion PTHrP and Human Breast Cancer Cells
Published 2010-01-01“…PTHrP is a polyhormone undergoing proteolytic processing into smaller bioactive forms, comprising an N-terminal peptide, which is the mediator of the “classical” PTH-like effect, as well as midregion and C-terminal peptides. …”
Get full text
Article -
709
Molecular Imaging of Hypoxia-Inducible Factor 1α and von Hippel-Lindau Interaction in Mice
Published 2008-05-01“…We have developed a novel method of studying the interaction between HIF-1α and pVHL using the split firefly luciferase complementation-based bioluminescence system in which HIF-1α and pVHL are fused to amino-terminal and carboxy-terminal fragments of the luciferase, respectively. …”
Get full text
Article -
710
Successful Aging and Longevity in Older Old Women: The Role of Depression and Cognition
Published 2011-01-01“…Based in successful aging theory and terminal cognitive drop research, this paper investigates cerebrovascular burden (CVB), depressive symptoms, and cognitive decline as threats to longevity. …”
Get full text
Article -
711
Resource allocation strategy for ultra-dense Internet of things based on graph convolutional neural network
Published 2024-10-01“…To address the significant issue of hidden terminal interference that severely impacted resource management in ultra-dense Internet of things (UD-IoT) environments, a deep deterministic gradient-based conflict-free resource allocation strategy using graph convolution neural network was proposed. …”
Get full text
Article -
712
Prescribed Performance Guidance Law with Multiple Constraints
Published 2022-01-01“…In the terminal guidance phase of intercepting aerial target, a guidance law, satisfying impact angle constraint, acceleration constraint, and second-order dynamic characteristic of interceptor autopilot, is designed based on the prescribed performance control and dynamic surface control method. …”
Get full text
Article -
713
A Novel Guidance Law for Intercepting a Highly Maneuvering Target
Published 2021-01-01“…Firstly, based on the nonsingular terminal sliding mode control theory, a finite-time convergent nonsingular terminal sliding mode surface is designed. …”
Get full text
Article -
714
Castleman's Disease and Neutropenic Enterocolitis Presenting as Crohn’s Disease
Published 1998-01-01“…Small bowel follow-through suggested Crohn's of the terminal ileum. Colonoscopy confirmed ulcerations in the terminal ileum and cecum, with biopsies showing necrosis and inflammation. …”
Get full text
Article -
715
Exploring the End-of-Life Experiences of Advanced Cancer Patients from India
Published 2022-06-01“…This study argues for renewed attention on the socio-cultural characteristics of terminally ill patients to enhance individualized care through culturally-competent interventions.…”
Get full text
Article -
716
Second-Order Sliding Mode Guidance Law considering Second-Order Dynamics of Autopilot
Published 2019-01-01“…Firstly, based on the terminal sliding mode control, we design a fast nonsingular terminal sliding mode guidance law with impact angle constraint. …”
Get full text
Article -
717
Ruptured Rudimentary Horn Pregnancy at 25 Weeks with Previous Vaginal Delivery: A Case Report
Published 2012-01-01“…Pregnancy in a noncommunicating rudimentary horn is extremely rare and usually terminates in rupture during first or second trimester of pregnancy. …”
Get full text
Article -
718
Feedback bit allocation in distributed antenna array systems
Published 2020-11-01“…In a frequency division duplex communication system,precoding at the base station usually requires terminal feedback channel state information.In a distributed array system,the channel conditions between the terminal and different access nodes in the cell are different because multiple access nodes are arranged at different locations in the cell.When the resources for feedback channel state information are limited,the allocation method of feedback bit needs to be optimized to improve the overall performance of the system.In a multi-user distributed array system,an access node selection method based on distance threshold was adopted.Based on this method,the quantization characteristics of the random vector quantization codebook and the Taylor expansion method were used to derive the system quantization capacity loss,and then an approximate expression was given.Based on this expression,a feedback bit allocation method was proposed.Compared with other allocation methods,the method of this paper was more universal because it did not limit the number of access nodes selected by the user.The simulation results show that the strategy proposed is superior to the traditional equal-bit allocation scheme and can obtain better performance when the feedback resources are limited.…”
Get full text
Article -
719
Multi-source data security protection of smart grid based on combination key
Published 2020-01-01“…As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that the information cannot be safely exchanged due to the shortage of keys.The sharding and combination technology based on keys was proposed to realize the expansion of limited keys,so as to solve the problem of a large number of keys needed for multi-node and mul-ti-service.Firstly,a sharding scheme was obtained according to different conditions.A key was divided into several dif-ferent sub-key pieces,and then a new key was generated by combining these key pieces and distributed to different ter-minals in the system.A large number of combined keys generated were conducive to update key ,which could ensure the data service “one at a time” and effectively enhance the communication system's ability to resist damage and invasion.Through analysis and calculation,the effectiveness of this method in realizing real-time update of a large number of ter-minal business keys with limited keys was further verified,and data secure communication was realized.…”
Get full text
Article -
720
Exploration of intelligent education method:mobile game assisted research teaching
Published 2019-12-01“…The technology of intelligent IoT and ubiquitous access lead to the change of the learning mode.The traditional mobile phone assisted teaching mode just simply transplants some contents of classroom teaching to the Internet terminal,which does not give full play to the flexibility and interest of the mobile intelligent terminal.Based on the fragmentation of learning content and the innovation of mobile communication technology,a ubiquitous learning theory oriented to auxiliary teaching was proposed,which made full use of the advantages of fragmentation time and mobile learning and made fragmented learning possible.Then,the feasibility of game assisted teaching was demonstrated,including the collaborative learning network,situational cognitive theory and ubiquitous learning.In addition,a learner-centered game assisted teaching model was proposed,which consists of three parts including game assisted teaching strategy,learner and teaching design model.It pays more attention to the realization of expected teaching objectives and the maintenance of learning stickiness.Finally,the feasibility and effectiveness of ubiquitous learning theory were verified by the experimental results of two courses of mobile phone assisted teaching,which makes mobile game assisted teaching a useful supplement to traditional classroom teaching.…”
Get full text
Article