Suggested Topics within your search.
Suggested Topics within your search.
- Nursing 4
- Nursing Assessment 4
- Nursing Care 4
- Surgical nursing 4
- Computer programs 2
- Electronics 2
- Health 2
- Perioperative Nursing 2
- Abnormalities 1
- Abnormalities, Human 1
- Anesthesia 1
- BASIC (Computer program language) 1
- Business 1
- Cardiac Surgical Procedures 1
- Certification 1
- Child 1
- Commercial statistics 1
- Communication 1
- Corporations 1
- Design and construction 1
- Educational psychology 1
- Electronic data processing personnel 1
- Embryology 1
- Embryology, Human 1
- English language 1
- Examinations 1
- Finance 1
- Genital Diseases, Female 1
- Grammar 1
- Gynecology 1
-
1121
Cardiac Tamponade from Purulent Pericarditis due to Cutibacterium acnes
Published 2018-01-01“…Initial stabilization and diagnosis were made via pericardiocentesis; afterward the patient underwent a pericardial window. Due to a severe penicillin allergy, he was successfully treated with a 14-day course of vancomycin. …”
Get full text
Article -
1122
SEVEN CHANNEL REZZPA UNIVERSAL JOINT STRESS ANALYSIS AND SIMULATION
Published 2019-01-01“…Based on the force model of the ball in the cage type constant velocity universal joint,the expressions of the circumferential force of the groove on the steel ball,the normal contact force of the channel to the steel ball and the normal contact force of the cage window to the steel ball are deduced when the steel ball moves in the inner groove and the bell shaped outer channel of the star sleeve. …”
Get full text
Article -
1123
Pedestrian Motion Path Detection Method Based on Deep Learning and Foreground Detection
Published 2021-01-01“…Experimental results show that the proposed method not only improves the practical application of pedestrian rerecognition but also reduces the detection range, computational complexity, and false detection rate compared with sliding window method.…”
Get full text
Article -
1124
Optimization of Urban Cold Chain Transport Routes under Time-Varying Network Conditions
Published 2021-01-01“…Given the time-efficient characteristics of urban cold chain transportation and the time-varying characteristics of urban road speed, customers encounter the problem of limited vehicle path optimization due to a fuzzy time window. An optimization model of urban cold chain transportation with the objective function as the minimum total cost is constructed under the premise of service reliability, and an artificial immune particle swarm optimization algorithm is designed to solve the model. …”
Get full text
Article -
1125
Research of Surrogate Measure for Freeway Crashes Based on Tire Skid Marks
Published 2021-01-01“…By collecting and analyzing the data based on selected arterial and freeway segments in the Reno-Sparks area in northern Nevada, a methodology was developed to categorize different tire skid marks. Sliding window and linear regression techniques were applied to determine any correlation between tire skid marks and crashes. …”
Get full text
Article -
1126
OPTICAL BISTABILITY IN A DEGENERATE TWO-LEVEL EIT MEDIUM UNDER THE INFLUENCE OF AN EXTERNAL MAGNETIC FIELD: AN ANALYTICAL APPROACH
Published 2021-07-01“…By controlling the external magnetic field, we find that the appearance and disappearance of the optical bistability can be easily controlled according to the strength of the magnetic field in the transparent window domain. Furthermore, the effects of the intensity of the coupling laser field and the parameters of the system on the behavior of optical bistability are also considered. …”
Get full text
Article -
1127
A SNEAK PEEK INTO LIGETI'S MAILBOX: "IL ME FERA GRAND PLAISIR D’ÉCRIRE UN QUATUOR À CORDES POUR LES ARDITTI. MAIS QUAND? ..."
Published 2014-12-01“…Remaining an unrealised dream, along with other works, such as the operas Alice's Adventures in Wonderland, The Tempest and the orchestra piece Labyrinth, the String Quartets Nos.3 and 4 represent a window into Ligeti’s laboratory, allowing us to glimpse, through fragmentary clues, the author’s secret ingredients, ideas and creative mechanisms. …”
Get full text
Article -
1128
Container intrusion detection method based on host system call frequency
Published 2021-08-01“…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
Get full text
Article -
1129
Sub-topic detection and tracking based on dependency connection weights for vector space model
Published 2013-08-01“…Aiming at the phenomenon that there are abrupt reports,similar topics and abundant levels of subtopics in the news,a novel method based on relationship analysis using dependent sentence pattern was proposed for sub-topic detection and tracking (sTDT),which constructed feature dimensions to generate the global vectors according to the increment of TF-IDF,and then created the partial adjoin map based on the connection weights within the time window and decreased the dimensions through dependent sentence pattern.Finally,a novel method for sTDT computing was built with adjoins dictionary weights and time threshold attenuation.Experiments show that the proposed method transferrs the text from linear to plane structure,and extracts the subtopics effectively,of which the minimum DET cost is reduced by at least 2.2 percent than that of classical methods.…”
Get full text
Article -
1130
OPTIMALISASI PENCAHAYAAN ALAMI GEDUNG PERPUSTAKAAN (STUDI KASUS: GEDUNG PERPUSTAKAAN UNIVERSITAS ISLAM NEGERI ALAUDDIN MAKASSAR)
Published 2023-12-01“…On the second floor, a centrally positioned light shelf with a 15° angle on each outer window opening yields the highest R2 value of 0.94. …”
Get full text
Article -
1131
Interplanting Secondary Crops into Existing Strawberry Fields.
Published 2005-02-01“…An early start on secondary crops allows producers to take advantage of a marketing window when few other regions are producing. The most common secondary crops are squash, cantaloupe, pickles, and peppers. …”
Get full text
Article -
1132
Is it the End of the Ice Age?
Published 2023-06-01“…When considering what is known about the injury cascade, the optimal application window for ice is in the immediate acute stage following injury to reduce the proliferation of secondary tissue damage that occurs in the hours after the initial injury. …”
Get full text
Article -
1133
Resource scheduling algorithm of satellite communication system for future multi-beam dense networking
Published 2021-04-01“…The resource scheduling problem of satellite communication systems under the condition of high-dynamic and resource limitation was studied.A resource scheduling model for satellite communication systems was established based on time window, energy consumption, number of channels, user priority and task suddenness.Considering the disadvantages of slow initial search speed and weak local search ability, the improved ant colony algorithm based on construction of initial solution set and extra pheromone deposition was proposed to solve the resource scheduling problem.The optimization characteristics of the number of completed tasks, priority and scheduling completion time were simulated and analyzed.The results show that the algorithm has a fast convergence rate.Compared with the same type optimization algorithm, the algorithm has high scheduling efficiency, therefore, it is suitable for scheduling satellite communication system resources for multi-beam dense networking in the future.…”
Get full text
Article -
1134
Adaptive Predictive Control: A Data-Driven Closed-Loop Subspace Identification Approach
Published 2014-01-01“…By combining the merits of receding window and recursive identification methods, an adaptive mechanism for online updating subspace matrices is given. …”
Get full text
Article -
1135
Dynamic adaptive trust evaluation model based on interaction-aware
Published 2012-10-01“…A dynamic adaptive trust evaluation model was established based on interaction-aware.The historical interaction window and trustworthy recommendation number was introduced in overall trust evaluation method,which overcomes the shortage of traditional models that lack the capacity to interaction-aware.The direct trust accumulation method based on interaction satisfaction degree iterative calculation was proposed,which achieved the incentive and penalty iterative strategy based on entity stability factor,and effectively inhibits malicious entities with camouflage.A synthetical recommendation trust aggregating method based on combination of direct and indirect recommendation trust was given,which solved the accuracy low and unreliable problems of traditional recommendation methods by introducing entity familiarity factor and scoring similarity factor.Simulation results show that,compared to the existing trust model,the model can effectively improve the accuracy of trust evaluation,and can provide a better capacity of resisting collusive entities.…”
Get full text
Article -
1136
Fiction ou réalité : Les biographies de Constance Fenimore Woolson
Published 2007-01-01“…Did she commit suicide or fall from a window by accident? Nobody knows. Contemporary novelists like David Lodge, Colm Toibin or Emma Tennant are puzzled by her relationship with Henry James.…”
Get full text
Article -
1137
America is Dead. Long Live America! Political Affect in Days Gone
Published 2021-09-01“…While this research addresses matters of representation—particularly notions of fraught masculinity and a struggle for recognition—its focus is on how the game functions as a window onto a fantasy of American self-reliance and populism that strongly resonates with a Trump-era nationalist turn in the U.S. …”
Get full text
Article -
1138
Effective retransmission in network coding for TCP
Published 2014-08-01“…Theoretical analysis for evaluating the decoding delay and redundancy of the different retransmission schemes show that the feedback based retransmission scheme has a lower decoding delay than the scheme with a fixed retransmis-sion rate, whereas these schemes which retransmit packets containing all packets in the coding window are deeply influ-enced by the loss rate. Therefore a novel network coding retransmission scheme which uses the implicit information of seen scheme to acquire the number of packets the receiver needs for decoding packets is proposed, the encoding rules of retransmission to let a part of packets decodable in advance are changed. …”
Get full text
Article -
1139
Florida Peach and Nectarine Varieties
Published 2013-07-01“…Furthermore, ripening of these cultivars during April and May ensures an early spring market window for tree-ripe fresh fruit in Florida before peaches and nectarines from other southeastern states and California come to market. …”
Get full text
Article -
1140
Florida Peach and Nectarine Varieties
Published 2013-07-01“…Furthermore, ripening of these cultivars during April and May ensures an early spring market window for tree-ripe fresh fruit in Florida before peaches and nectarines from other southeastern states and California come to market. …”
Get full text
Article