Showing 661 - 680 results of 1,895 for search '"hierarchical"', query time: 0.05s Refine Results
  1. 661

    Risk of Dementia and Its Associated Factors Among the Patients With Coronary Artery Disease Attending a Tertiary Cardiac Hospital of Dhaka City: A Cross‐Sectional Study by Fardina Rahman Omi, Lingkan Barua, Palash Chandra Banik, Syed Mosfiqur Rahman, Mithila Faruque

    Published 2025-01-01
    “…The associated factors of dementia risk were elucidated using hierarchical multiple regression analysis. Results The mean ( ± standard deviation) risk score for dementia was 6.26 ± 2.28. …”
    Get full text
    Article
  2. 662

    True cancer stem cells exhibit relative degrees of dormancy and genomic stability by Sanford H. Barsky, Krista Mcphail, Justin Wang, Jordan Dillard, Crystal J. Beard, Yin Ye

    Published 2025-02-01
    “…However, even if these properties can be demonstrated within a tumor cell subpopulation, it does not mean that they are truly hierarchical stem cells because they could have been derived from the proliferating population in a reversible manner. …”
    Get full text
    Article
  3. 663

    New probabilistic methods for quantitative climate reconstructions applied to palynological data from Lake Kinneret by T. Netzel, A. Miebach, T. Litt, A. Hense

    Published 2025-02-01
    “…The complex age–sediment–depth and proxy–climate relationships must be described in an appropriate way. Bayesian hierarchical models are a promising method for describing such structures.…”
    Get full text
    Article
  4. 664

    L’homosexualité, une « question difficile ». Distinction et hiérarchisation des sexualités dans l’éducation sexuelle en milieu scolaire by Aurore Le Mat

    Published 2014-07-01
    “…This paper analyzes the processes of classification and hierarchical organization of homosexuality and heterosexuality in sex education curricula. …”
    Get full text
    Article
  5. 665

    The Intermediate Data Structure (IDS) for Longitudinal Historical Microdata, version 4 by George Alter, Kees Mandemakers

    Published 2014-05-01
    “…Discussions with users over the last four years resulted in important changes, like the inclusion of a new table defining the hierarchical relationships among ‘contexts’, decision schemes for recording relationships, additional fields in the metadata table, rules for handling stillbirths, a reciprocal model for relationships, guidance for linking IDS data with geospatial information, and the introduction of an extended IDS for computed variables.…”
    Get full text
    Article
  6. 666

    Regionalización de las migraciones residenciales interurbanas en Chile en el período 1997‑2002 by Severino Escolano‑Utrilla, Jorge Ortiz-Véliz, Rodrigo Moreno-Mora

    Published 2020-03-01
    “…Nevertheless, their combination build a hierarchical and very stable structure, composed of groups of cities with strong reciprocal migratory interconnections. …”
    Get full text
    Article
  7. 667

    Access control model for multi-source heterogeneous data in big data environment by Qiuyue SU, Xingshu CHEN, Yonggang LUO

    Published 2019-02-01
    “…The big data platform is open and shared,but with the increasing amount of data and the complex and variable user access context,the RBAC model is difficult to meet the fine-grained and flexible access control in big data environment.To solve this problem,an access control model for multi-source heterogeneous data in big data platform is proposed.The model dynamically determines role permissions based on attributes and builds a hierarchical structure based on data groups to achieve simple management of data attributes.The model is formally defined,and the implementation and workflow in Hadoop platform are described.The experimental results show that the performance overhead of the proposed scheme is relatively small.…”
    Get full text
    Article
  8. 668

    Feminist Theology and Christian Ministry by John Stephanus Klaasen

    Published 2016-07-01
    “… Christian ministry in Catholic, traditional Protestant and Anglican churches is based on the hierarchical and patriarchal ecclesiastical models that separate male and female. …”
    Get full text
    Article
  9. 669

    Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis by Rita de Fátima Muniz

    Published 2022-09-01
    “…In a WSN a node is no longer useful when its battery dies, so to avoid this problem many protocols were introduced, but most of the rank is given to hierarchical routing protocols. In this paper, we analyze LEACH protocol, its phases, advantages and disadvantages and various kinds of attacks on this routing protocol.…”
    Get full text
    Article
  10. 670

    ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN by Xiao-guang NIU, Chuan-bo WEI, Wei-jiang FENG, Guo-jun PENG, Huan-guo ZHANG

    Published 2015-06-01
    “…According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network traffic were analyzed.Then,an optimal non-uniformly statistic-source anonymity protocol (ONSA)was proposed to achieve source anonymity and reduce the network traffic.ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters.The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.…”
    Get full text
    Article
  11. 671

    Tourism in the Mountains of Central Kerala (South India): at the Crossroads of Attitudes Towards Forest Populations by Lucie Dejouhanet

    Published 2018-01-01
    “…Through several examples of tourist sites in Kerala, this article analyses the place accorded to the mountain Adivasi in the collective and tourist imagination, the role assigned to the local populations in tourist development, and how tourism brings out the hierarchical and inegalitarian social relations existing within forest society.…”
    Get full text
    Article
  12. 672

    De la Catedral al cementerio y de la procesión al desfile: festejos nacionales cívico-religiosos en México, 1826-1842 by David Carbajal López

    Published 2017-06-01
    “…In the first decades following independence, Mexican national holidays were based on the Catholic Monarchy's model of festivities: the main setting was the Cathedral, the nation was represented as a corporate body and therefore heterogeneous and hierarchical; the formalities with the authorities were fundamental as they displayed the power of the National’s Patronage. …”
    Get full text
    Article
  13. 673

    Models, Metaphors and Symbols for Information and Knowledge Systems by David Williams

    Published 2014-01-01
    “…A literature search indicates that Data, Information and Knowledge continue to be placed into a hierarchical construct where it is considered that information is more valuable than data and that information can be processed into becoming precious knowledge. …”
    Get full text
    Article
  14. 674

    Molecular Vibration-Activity Relationship in the Agonism of Adenosine Receptors by Hyun Keun Chee, S. June Oh

    Published 2013-12-01
    “…The molecular vibration-activity relationship in the receptor-ligand interaction of adenosine receptors was investigated by structure similarity, molecular vibration, and hierarchical clustering in a dataset of 46 ligands of adenosine receptors. …”
    Get full text
    Article
  15. 675

    AN ORIGINAL COPY: THE FILM ADAPTATION OF KAZUO ISHIGURO’S NEVER LET ME GO / ORJİNAL BİR KOPYA: KAZUO ISHIGURO’NUN NEVER LET ME GO ROMANININ FİLM UYARLAMASI by Hatice YURTTAŞ

    Published 2016-12-01
    “…Discussing the novel’s deconstructive strategies through which the categories of the human, authenticity and copy are unsettled, it is suggested that Ishiguro’s text distinguishes itself from science fiction genre where these categories are affirmed by relocating them in a hierarchical relationship. Ishiguro reveals the power of fiction and stories in constructing identity based on dualities and this applies to both the clone and the human. …”
    Get full text
    Article
  16. 676

    Dynamic hierarchy resource management for heterogeneous cognitive network by Juan WEN, Min SHENG, Yan ZHANG

    Published 2012-01-01
    “…A dynamic hierarchy resource management approach-DHRM based on intelligent prediction was proposed for heterogeneous cognitive network.In DHRM,according to different time scale,the method of wavelet neural network,wiener prediction and reinforcement learning were brought to get the variation of traffic d ion,the resource requirement of the handover calls,and the information of users’preferences,and available hierarchical resources of all networks were allocated flexibly.Multi-attribute decision making method,based on network status and user preference was used to make decision to dynamically assign network traffic flow to the most appropriate network.Simulation results show that,the system capacity is improved about 20% by DHRM compared with the other joint radio resource management algorithms.…”
    Get full text
    Article
  17. 677

    Design of campus comprehensive access management platform by Cai-e XU, Feng XU, Xiao-hua LI, Dong-ming LU, Yan-qi CHENG

    Published 2013-09-01
    “…Considering access control with more card,scattered access flow data and poor scalabiliby in current unirersity building multi-system,the campus integrated access management platform triple frame design with the core of perception layer,transport layer and application layer was proposed.Campus card access control applications based on a unified data processing were realized,by method of Media and unified campus card authorization,implementing hierarchical managementand access networking,comprehensively regulate access standards and centralized storage of data water.The design not only facilitates the management of school access control applications,but also carries out data mining based access control and lay the foundation for leadership decision-making support.…”
    Get full text
    Article
  18. 678

    Establishing scheme and algorithm for dynamic key-path of pair wise key for sensor networks by HU Yu-zhou1, WANG Lei2, CHEN Zhi-ping2, GU Xue-dao3

    Published 2008-01-01
    “…Establishing scheme and algorithm for dynamic key-path in pair wise key for wireless sensor networks were presented based on the encoding peculiarity and high fault-tolerant ability of named H(k,u,m,v,n) (hierarchical hypercube) of cluster distributed sensor networks. …”
    Get full text
    Article
  19. 679

    Communication community detection algorithm based on ranking of strength by Hong-quan WEI, Hong-chang CHEN, Li-xiong LIU, Ju-long LAN

    Published 2014-10-01
    “…According to the characteristics of how to effectively describe real weighted network of the current telecom network problems,improvement and development of related models of complex networks,especially for communication community detection results hierarchy was not clear and the problem of high complexity,from the analysis of the characteristics of complex network,a new algorithm for community detection design communication.The algorithm to achieve effective communication strength ranking method based on community detection in communication,communication density distribution of generating high resolution based on hierarchical nesting tree,the distance vector pruning nested tree,the level of analysis and structure of community stability and reduce the computational complexity.The algorithm is verified using real network data.…”
    Get full text
    Article
  20. 680

    Research on Grid Scheduling of Super-Peer Model Based on QoS by Shanliang Pan, Xi Huang, Qinjiao Mao

    Published 2014-02-01
    “…Firstly,a kind of grid resource management model——super-peer model was proposed.For this model,economic mechanism was introduced,allowing a grid user to put forward the task’s expected execution deadline,cost limit and the weight parameters between them.Those are the QoS parameters of application-level.Then,a corresponding resource scheduling algorithm was shown.Next,hierarchical colored Petri net and price timed Petri net were used to model and the dynamic process of grid resource scheduling was simulated.Lastly,reachable task graph(RTG)of Petri net model was constructed and the system’s scheduling performance was analyzed,such as throughout capacity,load-balancing,scheduling time and cost through an example.…”
    Get full text
    Article