Showing 6,741 - 6,760 results of 21,030 for search '"multiplication"', query time: 0.10s Refine Results
  1. 6741

    Predicting academic procrastination of students based on academic self-efficacy and emotional regulation difficulties by Hamidreza Farhadi Rad, Shima Bordbar, Jamshid Bahmaei, Marjan Vejdani, Ali Reza Yusefi

    Published 2025-01-01
    “…Descriptive statistics, t-test, ANOVA, Pearson’s correlation coefficient, and multiple linear regression were employed to examine the data using SPSS 23 software. …”
    Get full text
    Article
  2. 6742

    Nutritional knowledge and practices of low-income women during pregnancy: a qualitative study in two Oaxacan cities by Marian Marian, Ramona L. Pérez, Amanda C. McClain, Samantha Hurst, Elizabeth Reed, Kathryn M. Barker, Rebecka Lundgren

    Published 2025-02-01
    “…Conclusion Nutritional knowledge and practices during pregnancy are impacted by multiple social identities women have and different factors at the individual, group, and structural level. …”
    Get full text
    Article
  3. 6743

    The research progress on effective connectivity in adolescent depression based on resting-state fMRI by Xuan Deng, Jiajing Cui, Jinyuan Zhao, Jinji Bai, Junfeng Li, Kefeng Li

    Published 2025-02-01
    “…Existing studies focus on the analysis of a single brain network, but rarely explore the interaction between multiple key networks.DiscussionTo do so, we can address these issues by integrating multiple technologies. …”
    Get full text
    Article
  4. 6744

    Risk Factors for Postoperative Nausea and Vomiting After TACE: A Prospective Cohort Study by Yuzhu Wang, Xin Zhou, Guoping Li, Qianzhou Lv, Xiaoyu Li, Zhiping Yan

    Published 2024-12-01
    “…To identify risk factors for PONV, multiple logistic regression analysis was used. The receiver operating characteristic (ROC) curve was plotted to assess the regression model. …”
    Get full text
    Article
  5. 6745

    Quantifying uncertainty in anthropogenic causes of injury and mortality for an endangered baleen whale by Daniel W. Linden, Jeffrey A. Hostetler, Richard M. Pace III, Lance P. Garrison, Amy R. Knowlton, Véronique Lesage, Rob Williams, Michael C. Runge

    Published 2024-12-01
    “…Our approach is relevant to other monitored populations where cause‐specific injuries from multiple threats can be observed in live and dead individuals.…”
    Get full text
    Article
  6. 6746

    IMU Sensor-Based Worker Behavior Recognition and Construction of a Cyber–Physical System Environment by Sehwan Park, Minkyo Youm, Junkyeong Kim

    Published 2025-01-01
    “…Additionally, about 500 fatalities occur annually, and multiple studies are being conducted to prevent these accidents and quickly identify their occurrence to secure the golden time for the injured. …”
    Get full text
    Article
  7. 6747

    Identification of Parkinson’s disease using MRI and genetic data from the PPMI cohort: an improved machine learning fusion approach by Yifeng Yang, Liangyun Hu, Yang Chen, Weidong Gu, Guangwu Lin, YuanZhong Xie, Shengdong Nie

    Published 2025-02-01
    “…Furthermore, by analyzing the features selected across multiple iterations of our models, we identified stable brain region features [lh 6r (FD) and rh 46 (GI)] and key genetic markers (rs356181 and rs2736990 SNPs within the SNCA gene region; rs213202 SNP within the VPS52 gene region), highlighting their potential as reliable early diagnostic indicators for the disease.ConclusionThe AE_Stacking model, trained on MRI and genetic data, demonstrates potential in distinguishing individuals with PD. …”
    Get full text
    Article
  8. 6748

    BUILDING THE FORECASTING SYSTEM OF DECISION-MAKING IN CLOUD COMPUTING by Nguyễn Tấn Thuận, Trương Tiến Vũ

    Published 2013-06-01
    “…This paper focus on the visualized software solution with the purpose of providing multiple services in the fields of business, commerce, education, health, tourism, etc. by collecting data via internet and building decision tree to predict forecast report to user through the algorithm C4.5. …”
    Get full text
    Article
  9. 6749

    Resource management in sliced networks with mobile edge computing for B5G and 6G by Qian SUN, Lin TIAN, Yiqing ZHOU, Chen FENG, Yuanyuan WANG, Jihua ZHOU

    Published 2021-06-01
    “…With the time-delay sensitive compute-intensive tasks growing exponentially, 5G and future 6G mobile cellular communication networks will form differentiated network slices with edge computing resource to service the multiple communication services.To achieve this, the wireless frequency and edge computing resources will be shared among the network slices, thus the efficient management of the resources is of great importance.The demands of resources management in the life duration of the network slice was analyzed.Then the research progress of the corresponding technologies for slices, i.e., access control, resources allocation and stimulating cooperation among terminals, were summarized.And the open research issue was given.Thus, the resources are managed efficiently for the slices with edge computing resource.…”
    Get full text
    Article
  10. 6750

    Dynamic roles of tumor-infiltrating B lymphocytes in cancer immunotherapy by Shishengnan Song, Chong Wang, Yangchao Chen, Xiaorong Zhou, Yi Han, Haijian Zhang

    Published 2025-02-01
    “…Naive B cells present the initial antigen, germinal center B cell subsets enhance antibody affinity, and immunoglobulin subtypes exert multiple immune effects, while regulatory B cells establish immune tolerance. …”
    Get full text
    Article
  11. 6751

    Energy-efficiency maximization scheme for data collection in wireless power communication networks by Haijiang GE, Zhanwei YU, Kaikai CHI

    Published 2019-12-01
    “…WPCN composed of multiple RF energy sources and sinks was studied.The energy efficiency of data collection were maximized by jointly optimizing the transmission power of energy sources,the time allocation of wireless energy transfer and the time allocation of nodes’ data transmission.Specifically,the energy efficiency maximization problem was modeled firstly.Then,the optimal value of transmitted power was obtained,and the monotonicity of energy-efficiency function and the convexity of throughput function were further deduced.Finally,based on these properties,an efficient algorithm which combines golden-section search and bisection search was designed to get the optimal solution quickly.The simulation results show that the proposed optimal algorithm can significantly improve the energy efficiency compared with the baseline scheme.…”
    Get full text
    Article
  12. 6752

    Database for a temperature model along urban Dâmbovița River by Gogoașe Nistoran Daniela-Elena, Ionescu Cristina Sorana, Opriș Ioana, Simionescu Ștefan-Mugur, Copilău Cristian

    Published 2025-01-01
    “…To this end, in the summers of 2020, 2021 and 2023 were acquired using multiple data of hydraulic and climate variables using temperature loggers equipped with bluetooth technology and remote sensing climate data retrieved from Open Weather. …”
    Get full text
    Article
  13. 6753

    Marsilea: an intuitive generalized paradigm for composable visualizations by Yimin Zheng, Zhihang Zheng, André F. Rendeiro, Edwin Cheung

    Published 2025-01-01
    “…To address this, we introduce “cross-layout,” a novel visualization paradigm that integrates multiple plot types in a cross-like structure, with a central main plot surrounded by secondary plots for enhanced contextualization and interrelation insights. …”
    Get full text
    Article
  14. 6754

    New delay measurement method based on accurate timestamp in OpenFlow by Xin-yi QIU, Jun LI, Jian-er ZHOU, Jing-jing LI

    Published 2017-11-01
    “…At present,delay measurement methods in OpenFlow network have the disadvantage of excessive network resources and poor measurement accuracy.DeMon,an active mechanism to measure the delay of multiple paths between any two switch based on the controllable feature of individual traffic flow provided in OpenFlow was proposed.DeMon required only one probe packet to be send from controller,which was excepted to reduce the operational cost.Moreover,DeMon used OpenFlow switch instead of controller to get the timestamp of probe packet,making the measurement accuracy and stability have been greatly improved compared with other monitoring techniques in the OpenFlow network.…”
    Get full text
    Article
  15. 6755

    Collaboration coding to multi-node repair program under the twin-MDS codes framework in cloud storage systems by Xian-zhong XIE, Qian HUANG, Liu-su WANG

    Published 2015-11-01
    “…A multi-node exact repair code scheme,which can repair multiple system nodes or redundant nodes simultaneously,was shown and proved to against the disadvantages of the existing multi-node repair model in cloud storage.The multi-node exact repair code was combined with a twin-MDS codes framework with health cooperative nodes.In this way,repair bandwidth,the number of repair links and the amount of data to be treated in an intermediate node were reduced,while multi-node were repaired.Finally,numerical simulation results show that this scheme has greater improvements.In particular,it reduces the load in an intermediate node.And the advantages was more obvious with the more storage nodes in cloud storage.…”
    Get full text
    Article
  16. 6756

    Acute diquat poisoning induces paralytic ileus and hepatic portal venous gas: a case report by Hongji Yin, Dongxing Sun, Fengting Liu, Ruosai Xin

    Published 2025-02-01
    “…Despite aggressive treatment, including gastric lavage, drainage, and blood purification, the patient ultimately succumbed to multiple organ failure. This report explores the potential causes of HPVG, including infection and elevated intestinal pressure, and highlights the possibility that montmorillonite may have exacerbated this process.…”
    Get full text
    Article
  17. 6757

    Design of tree topology based Byzantine fault tolerance system by Wei-dong LYU, Xue-guang ZHOU, Zhi-min YUAN

    Published 2017-11-01
    “…A tree topology based Byzantine fault tolerance system was designed and the calculation of the Byzantine node bound based on depth and width was given.The consistency protocol was designed through divide the tree into groups by communication and work,which guaranteed the safety of system.The access of a node was determined with joint signature mechanism.The Byzantine nodes were placed to the leaves by view change protocol,which guaranteed the liveness of the system.On the foundation of traditional protocol,the new protocol support multiple tasks operating at the same time,and communication between nodes is largely decreased,as well as the space complexity,hence the feasibility being promoted,and the gap between Byzantine fault tolerance system and the non-Byzantine systems being narrowed.…”
    Get full text
    Article
  18. 6758

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    “…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
    Get full text
    Article
  19. 6759

    On functionals of a marked Poisson process observed by a renewal process by Jewgeni H. Dshalalow, Jean-Baptiste Bacot

    Published 2001-01-01
    “…In various stochastic models applications (such as queueing with N-policy combined with multiple vacations), it is necessary to operate with the value of Π prior to the first passage time, or prior to the first passage time plus some random time. …”
    Get full text
    Article
  20. 6760

    Multifactorial QT Interval Prolongation and Takotsubo Cardiomyopathy by Michael Gysel, Alexander Crystal, Jules C. Hancox, Michelle Methot, Adrian Baranchuk

    Published 2014-01-01
    “…The case highlights the role of TCM as a cause of LQTS in the setting of multiple risk factors including old age, female gender, hypokalemia, and treatment with QT prolonging medications. …”
    Get full text
    Article