Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
3961
Imaginar la nanotecnología, controlarla democráticamente
Published 2009-01-01“…La diversidad de las nanotecnologías disponibles, la invisibilidad de la escala a la que operan, el amplísimo abanico de aplicaciones potenciales o reales, las controversias sobre qué constituye una "auténtica" investigación nanotecnológica, las dinámicas dominantes de relación entre investigación científica, desarrollo tecnológico y sociedad, son factores que no facilitan, precisamente, que los ciudadanos se formen una imagen ajustada de las tecnologías nanoescalares. Se demandarán múltiples representaciones, múltiples imágenes, correspondientes a cada una de las innovaciones, lo que a su vez precisará de un tiempo considerable. …”
Get full text
Article -
3962
Representation for uncertainty trust of WSN based on lightweight-cloud
Published 2014-02-01“…Simulation results show that this method overcomes the contradiction between the sensitivity and tolerance of traditional trust management framework, furthermore, it's not only tolerant of abnormal conditions, but also sensitive to multiple attacks.…”
Get full text
Article -
3963
Data security for internet plus in public cloud
Published 2017-10-01“…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
Get full text
Article -
3964
Pattern division random access (PDRA) scheme for mMIMO systems
Published 2022-10-01“…To enhance the massive machine-type communications (mMTC) random access (RA) performance, a pattern division random access (PDRA) scheme was proposed for massive multiple-input multiple-output (mMIMO) systems.In this scheme, the pilot contention space was expanded to the pattern-domain.To enlarge the size of contention space without resorting to increasing the physical resources, the pattern-domain pilot was constructed based on the superposition of L cyclically-shifted Zadoff-Chu (ZC) sequences.Simulation results illustrate that the PDRA scheme can reduce pilot collision probability significantly, and improve the access success probability compared with the conventional RA scheme, without compromising excessively on channel estimation and data detection performance.…”
Get full text
Article -
3965
Cooperative MIMO transmission scheme for clustered ad hoc networks
Published 2012-03-01“…The potential of cooperative multiple-input multiple-output (CMIMO) transmission was explored.An according CMIMO transmission scheme was proposed for clustered ad hoc networks,including two critical aspects.The first was weighted cooperative node selection algorithm,which synthesized the asymmetrical bi-directional channel state information (CSI) between nodes,as well as the nodes’ residual energy and connectivity.Consequently,a set of optimal nodes was selected to develop the CMIMO system mentioned above.The second was the mechanism of establishing and maintaining virtual link between two virtual nodes.Simulation shows that the proposed CMIMO transmission scheme affords higher capacity against SISO,and the scheme with node selection is more energy-efficient than that without node selection for the 70% energy saved.…”
Get full text
Article -
3966
Task offloading and resource allocation in NOMA-based ultra-dense MEC networks
Published 2022-02-01“…In order to improve spectrum efficiency and meet the service demands of massive users, a non-orthogonal multiple access (NOMA)-based ultra-dense mobile edge computing (MEC) system was considered.In order to solve the serious communication interference caused by simultaneous offloading of multiple users and make efficient use of edge server resources, a joint task offloading and resource allocation scheme was proposed to minimize the system energy consumption while meeting the quality of service (QoS) of all users.Offloading decision, power control, computation resource and subchannel resource allocation were jointly considered in the proposed scheme.Simulations results show that the proposed scheme can efficiently lower system energy consumption compared to the other offloading schemes.…”
Get full text
Article -
3967
Coronary Artery Fistulae Discovered during Presentation of a Patient Having Heart Failure due to Severe Aortic Stenosis
Published 2014-01-01“…Further evaluation revealed multiple CAF with abnormal drainage to the right pulmonary artery. …”
Get full text
Article -
3968
Study on Unified Identifier Authentication Service and Standards on Public Network
Published 2013-02-01“…The aim of unified identifier authentication(UIA)is to 1og in multiple services with only one identifier to simplify user’s access. …”
Get full text
Article -
3969
-
3970
Pneumatosis Coli Formation via Counterperfusion Supersaturation in a Patient with Severe Diarrhea
Published 2018-01-01“…We present the case of an elderly male patient with known multiple myeloma who was hospitalized with profuse watery diarrhea and abdominal pain after a course of induction chemotherapy. …”
Get full text
Article -
3971
Pilot decontamination in massive MIMO system combining time-shifted and cell sectorization pilot assignment
Published 2017-02-01“…Pilot contamination is appeared in massive MIMO (multiple input multiple output) system when using the same pilot sequences at different cells to get the channel state information.It becomes a bottleneck problem of massive MIMO when the number of antenna goes infinite.In order to dealt with pilot contamination,a new TS-CSPA joint scheme was proposed.This scheme can mitigate pilot contamination by reduce the reuse of pilot sequence through the time domain and space domain.And the closed-form expression for the achieved rates and signal to interference plus noise ratio(SINR) to verify the advantages of the proposed scheme were given.Numerical results show that significant performance gains to mitigate pilot contamination problem compared to other methods.…”
Get full text
Article -
3972
Self-attention mechanism-based CSI eigenvector feedback for massive MIMO
Published 2023-11-01“…Massive multiple-input multiple-output (MIMO) system can provide satisfying gain of spectrum efficiency for 5G and future wireless communication systems.In frequency-division duplex (FDD) mode, downlink channel state information (CSI) needs to be accurately fed back to the base station side to obtain this gain.To improve the feedback accuracy of downlink CSI eigenvector, a self-attention mechanism-based CSI feedback method named SA-CsiNet was proposed.SA-CsiNet respectively deployed self-attention modules at the encoder and the decoder to achieve feature extraction and reconstruction of CSI.Experimental results show that compared with codebook-based and conventional deep learning-based CSI feedback approaches, SA-CsiNet provides higher reconstruction accuracy of CSI.…”
Get full text
Article -
3973
Planetary Roller Hub-type Continuously Variable Transmission
Published 2024-08-01“…In this study, a new planetary roller wheel continuously variable transmission (CVT) is developed, which achieves independent variable speed drive of the wheel hub by means of multiple sets of roller friction drives. The inner ring of the wheel is an internal gear ring, driven by multiple planetary distribution gears to increase the wheel drive power. …”
Get full text
Article -
3974
Research on Pneumothorax Classification Model of DenseNet Based on Multilayer Network Optimization
Published 2024-01-01“…This method optimizes multiple network layers and ensures the convergence of the neural network by reducing the learning rate with each iteration. …”
Get full text
Article -
3975
A PKI-based multi-channel unified identity authentication method for energy information system
Published 2019-06-01“…There are problems of poor user experience,inconsistent management,and potential security risks in energy information system.It is urgent to study the issue of unified identity authentication between various electronic channels from the source to achieve unified management of multiple electronic service channels and service supervision of various electronic channels.A multi-dimensional electronic channel unified authentication method based on PKI certification was proposed for energy information system.Users could directly access each application system through the proposed method and perform fast and secure switching between application systems without multiple authentication processes.The approach provided users with the convenience and security of engaging in complex business management activities.…”
Get full text
Article -
3976
The Open Map
Published 2023-03-01“… Maps are preeminent ways of collecting, organising, verifying, historicising, and even mystifying territorial knowledge. They embrace a multiplicity of readings and readers, and mediate between the visible and the invisible. …”
Get full text
Article -
3977
Separated multi streams transmitting method based on SIP+P2P system
Published 2011-01-01“…A separated multiple media traffics transmitting method was proposed to solve the QoS problem of multi-service streaming.Based on SIP+P2P system,this method leveraged path diversity,selected different paths for each media stream,and switched path separately.By distributing multiple media streams into different single paths which had path diversity,this approach eliminated the affect on path quality introduced by high throughput media traffic.The NS2 simulation and real network test results show that the approach than the original single-path transmission method could further improve the quality of the path,and could effectively improve the service quality of multi-service streaming.…”
Get full text
Article -
3978
Note on Isomorphism Theorems of Hyperrings
Published 2010-01-01“…In this paper, we extend the isomorphism theorems to hyperrings, where the additions and the multiplications are hyperoperations.…”
Get full text
Article -
3979
Therapeutic potential of seaweeds and their biofabricated nanoparticles in treating urolithiasis: A review
Published 2025-01-01“…Consequently, drugs with multiple targets could be a safer and more effective remedy for treating urolithiasis. …”
Get full text
Article -
3980
Explainable Artificial Intelligence for Crowd Forecasting Using Global Ensemble Echo State Networks
Published 2024-01-01“…The computational complexity, execution time, and opaqueness are inherent challenges of deep learning models that also overlook the latent relationships between multiple real-time data streams for improved accuracy. …”
Get full text
Article