Showing 161 - 180 results of 5,999 for search 'Baldock~', query time: 5.75s Refine Results
  1. 161
  2. 162

    Link Prediction via Convex Nonnegative Matrix Factorization on Multiscale Blocks by Enming Dong, Jianping Li, Zheng Xie

    Published 2014-01-01
    “…Low rank matrices approximations have been used in link prediction for networks, which are usually global optimal methods and lack of using the local information. The block structure is a significant local feature of matrices: entities in the same block have similar values, which implies that links are more likely to be found within dense blocks. …”
    Get full text
    Article
  3. 163

    Leray–Schauder Fixed Point Theorems for Block Operator Matrix with an Application by Mohamed Amine Farid, El Miloudi Marhrani, Mohamed Aamri

    Published 2021-01-01
    “…In this paper, we establish some new variants of Leray–Schauder-type fixed point theorems for a 2×2 block operator matrix defined on nonempty, closed, and convex subsets Ω of Banach spaces. …”
    Get full text
    Article
  4. 164

    Lyme Carditis: An Interesting Trip to Third-Degree Heart Block and Back by Maxwell Eyram Afari, Fady Marmoush, Mobeen Ur Rehman, Umama Gorsi, Joseph F. Yammine

    Published 2016-01-01
    “…We present the case of a young female who presented with erythema migrans and was found to have first-degree heart block which progressed to complete heart block within hours. …”
    Get full text
    Article
  5. 165

    A Block-Based and Highly Parallel CNN Accelerator for Seed Sorting by Xiaoting Sang, Zhenghui Hu, Huanyu Li, Chunlei Li, Zhoufeng Liu

    Published 2022-01-01
    “…To date, the recognition speeds of the FPGA-based universal accelerators for high-throughput seed sorting tasks are slow, which cannot guarantee real-time seed sorting. Therefore, a block-based and highly parallel MobileNetV2 accelerator is proposed in this paper. …”
    Get full text
    Article
  6. 166
  7. 167
  8. 168
  9. 169

    Cryptanalysis and improvement of a block cryptographic scheme based on logistic map by YANG Ji-yun, LIAO Xiao-feng, XIAO Di, DENG Shao-jiang

    Published 2008-01-01
    “…Through analyzed of an improved chaotic block cryptographic scheme, it was found that this scheme behaves as a stream cipher indeed and generated keystream is independent with plaintext. …”
    Get full text
    Article
  10. 170
  11. 171
  12. 172

    Working Framework and Connotation of Building Block Methodology for Environmental Flow Assessment by DING Wei, LAN Lin, MIAO Lingzhan, HUANG Yuwei, SU Yongtao, SHAO Ningzi, HOU Jun

    Published 2022-01-01
    “…The existing method for environmental flow assessment in China only focuses on specific target species.Considering this deficiency,a holistic approach,i.e.,building block methodology (BBM),is elaborately introduced for evaluating environmental flow.According to the scientific basis and actual needs,this method accurately divides the research objects and influencing factors in the whole study area into different “blocks” and then explores the relationship between each “block” of influencing factors and each research object.Finally,a reasonable environmental flow scheme is drawn up for the whole study area.Its working steps are mainly divided into three parts:Before the seminar,experts collect the basic data;during the seminar,experts from various disciplines explain the collected data and reach a consensus on the recommended environmental flow;after the seminar,they develop the flow modification scheme and the monitoring plan.With the application examples of Sri Ram Sagar Reservoir in India and Daleeleva River in Norway,we analyze the characteristics and shortcomings of this method.It is revealed that this method can better ensure the ecological value and service value of rivers in the process of determining environmental flow and can provide a reference for its application in China.…”
    Get full text
    Article
  13. 173

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
    Get full text
    Article
  14. 174
  15. 175
  16. 176

    Electrical Injury-Induced Complete Atrioventricular Block: Is Permanent Pacemaker Required? by Osman Beton, Tolga Han Efe, Hakki Kaya, Murat Bilgin, Lale Dinc Asarcikli, Mehmet Birhan Yilmaz

    Published 2015-01-01
    “…Asystole, premature ventricular contractions, ventricular tachycardia, conduction disorders (various degrees of heart blocks, bundle-brunch blocks), supraventricular tachycardia, and atrial fibrillation are the other arrhythmic complications of electrical injury. …”
    Get full text
    Article
  17. 177
  18. 178
  19. 179

    A Rare Case of Complete Heart Block in a Young Patient by Zakaria Hindi, Yousef Hindi, Rami Batarseh

    Published 2018-01-01
    “…Introduction. Complete heart block (CHB) is considered as one of the dangerous rhythms since it can progress to lethal arrhythmias such as ventricular tachycardia. …”
    Get full text
    Article
  20. 180

    Waveform Characteristics of Tunnel Blast Waves and a Wave-Blocking Method by Xianshun Zhou, Xuemin Zhang, Tianhe Ren, Xuefeng Ou, Wenchao Xiong, Liming Zhang, Lei Zhang

    Published 2022-01-01
    “…Finally, it was found that a shorter distance from the NWBT to the source of the blast makes a better contribution to its wave-blocking effect. The waveform characteristics obtained in the study contribute to the design of tunnel surrounding structures; the application of the NWBT is a successful wave-blocking method for tunnels adjacent to environmentally sensitive areas.…”
    Get full text
    Article