Suggested Topics within your search.
Suggested Topics within your search.
- Climate Change 1
- Coding and Information Theory 1
- Coding theory 1
- Economic conditions 1
- Economics 1
- Environmental Health 1
- Film adaptations 1
- History and criticism 1
- Information theory 1
- Moral and ethical aspects 1
- Motion pictures and literature 1
- Nursing 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Public Health 1
- Public Policy 1
- Public health 1
- Sex role 1
- Social conditions 1
- Technique 1
- Teenage girls 1
- Watercolor painting 1
- research 1
- research methods 1
-
581
6G knowledge system construction: academic knowledge mining and on-demand application for full domains and omni scenarios
Published 2023-09-01“…At present, the concepts related to 6G have not been unified, and there is an urgent need for consistent cognition and definition.Academics and industries lack a clear understanding of the overall development of 6G and the research progress in related fields.Therefore, the 6G knowledge base and knowledge system was constructed.Firstly, the existing 6G academic documents were automatically screened and stored in a structured way.Secondly, a 6G knowledge base was constructed on the basis of labeling and standardizing text data.In addition, a comprehensive statistical analysis was conducted across all domains of 6G based on the knowledge base and the technologies such as natural language processing, deep neural network and latent tree model were used to realize the extraction and generation of 6G knowledge.Finally, on the basis of large-scale model training, the on-demand knowledge application was realized for diversified service requirements.…”
Get full text
Article -
582
Boublil and Daigle. Nietzsche and Phenomenology: Power, Life, Subjectivity. 2013
Published 2015-06-01“…This book has the contribution of some significant authors on related studies, as – besides organizers, Rodolf Boehm, Françoise Dastur, Babette Babich Keith Ansell-Pearson, Didier Franck, Lawrence J. …”
Get full text
Article -
583
Synthesis of Organic Ligands via Reactions of 4-Benzoyl-5-phenylamino-2,3-dihydrothiophene-2,3-dione with N-Nucleophiles
Published 2020-01-01“…The reaction of 4-benzoyl-5-phenylamino-2,3-dihydrothiophene-2,3-dione (1) with aminoheteroaryls, lamotrigine, 1,3-diaminoheteroaryls, dapsone, NH2R (hydroxylamine, DL-1-phenylethylamine, and metformin), and 4,4′-bipyridine in THF/H2O (1 : 1) at room temperature led to 3-N-phenylthiocarbamoyl-2-butenamides 2–5, while that with naphthylamines and 1,3-phenylenediamine in ethanol at high temperature led to 5-phenylamino-2,5-dihydrothiophene-2-ones 6–8 as organic ligands in the medium to good yields. …”
Get full text
Article -
584
Anomalias na distribuição geográfica dos dados de saúde da bacia hidrográfica do Ribeirão Lindóia, zona norte do município de Londrina/PR
Published 2012-03-01“…Aiming at characterizing the geographic distribution of health data of Ribeirão Lindóia Basin, in Londrina City in Paraná, Brazil, correlating the possible patterns of hydro geochemical anomalies, geochemical parameters of water quality were analyzed through the Atomic Emission Spectrometry with Inductively Coupled Argon Plasma (SiO4-4, Fe3+, Zn2+, PO3-4, Al3+) and the Atomic Absorption Spectrometry (Na+ e K+). For Datasus information crossings and spatial organization of health data, the Philcarto software was used, highlighting Dengue fever, Viral Hepatitis and Meningitis attendance in the period from 2000 to 2004. …”
Get full text
Article -
585
A scoping review of the landscape of health-related open datasets in Latin America.
Published 2023-10-01“…The review found 61 datasets from 23 countries, with the DATASUS dataset from Brazil contributing to the majority of articles. …”
Get full text
Article -
586
言語と、風景を形作る行為: 夏目漱石の作品における風景および環境への意識
Published 2020-12-01“…This article approaches the literary dimension of landscape action through the example of Natsume Sōseki, a major Japanese author of the beginning of the 20th century. …”
Get full text
Article -
587
Treatment of Bullous Systemic Lupus Erythematosus
Published 2015-01-01“…BSLE patients with corticosteroids treatment constantly do not receive a marked improvement, while dapsone generally dramatically improved the skin condition. …”
Get full text
Article -
588
Survey on user authentication protocol in wireless sensor network
Published 2017-01-01“…For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. …”
Get full text
Article -
589
Efficient and privacy-preserving online face authentication scheme
Published 2020-05-01“…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
Get full text
Article -
590
Metodeveilederen i Nav<subtitle>støttespiller, kunnskapsmegler og fanebærer</subtitle>
Published 2025-01-01“…Vi diskuterer dilemmaene i lys av translasjonsteori og finner at metodeveilederne fungerer som translatører, kunnskapsmeglere og fanebærere i en hybrid organisatorisk kontekst. De kvantitative dataene ble samlet inn ved hjelp av Mentimeter, som er lite brukt i forskningsøyemed.…”
Get full text
Article -
591
Heat and Helium-3 Fluxes from Teide Volcano, Canary Islands, Spain
Published 2019-01-01“…The thermal energy released from Teide summit cone by diffuse degassing was 2.2 MW, and the heat flux calculated through Dawson’s method was 8.1 MW, difference due to the comparison of purely convective areas as the crater with diffusive areas as the flanks of the volcano. …”
Get full text
Article -
592
Pyoderma Gangrenosum in Two Successive Pregnancies Complicating Caesarean Wound
Published 2014-01-01“…She responded well to local wound care, oral Prednisolone, and Dapsone and made a good recovery. Pregnancy being an immunologically altered status can play a role in development of pyoderma gangrenosum and one should always rule out its possibility when there is a delayed wound healing.…”
Get full text
Article -
593
Time-and-ID-Based Proxy Reencryption Scheme
Published 2014-01-01“…Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE) and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE). …”
Get full text
Article -
594
CBFM:cutted Bloom filter matrix for multi-dimensional membership query
Published 2016-03-01“…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
Get full text
Article -
595
-
596
Longitudinal Follow-Up of Mirror Movements after Stroke: A Case Study
Published 2015-01-01Get full text
Article -
597
High-performance federated continual learning algorithm for heterogeneous streaming data
Published 2023-05-01“…Aiming at the problems of poor model performance and low training efficiency in training streaming data of AI models that provide intelligent services, a high-performance federated continual learning algorithm for heterogeneous streaming data (FCL-HSD) was proposed in the distributed terminal system with privacy data.In order to solve the problem of the current model forgetting old data, a model with dynamically extensible structure was introduced in the local training stage, and an extension audit mechanism was designed to ensure the capability of the AI model to recognize old data at the cost of small storage overhead.Considering the heterogeneity of terminal data, a customized global model strategy based on data distribution similarity was designed at the central server side, and an aggregation-by-block manner was implemented for different modules of the model.The feasibility and effectiveness of the proposed algorithm were verified under various data increment scenarios with different data sets.Experimental results show that, compared with existing works, the proposed algorithm can effectively improve the model performance to classify old data on the premise of ensuring the capability to classify new data.…”
Get full text
Article -
598
Le jeu vidéo au défi de l’œuvre d’art
Published 2021-03-01“…Car cette cartographie n’est pas sans rapper l’esthétique goodmanienne, qui offre cinq critères d’articité : densité syntaxique, densité sémantique, saturation relative, exemplification et référence multiple et complexe.Dès lors, s’il est bien convenable de parler du jeu vidéo comme d’un art, il devient concevable de chercher les qualités propres de l’œuvre d’art vidéoludique, ses spécificités, qu’elle ne partage avec celle d’aucun autre médium. Nous proposons d’en retenir deux : le défi et l’implication.…”
Get full text
Article -
599
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01“…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
Get full text
Article -
600
Reduction algorithm based on supervised discriminant projection for network security data
Published 2021-06-01“…In response to the problem that for dimensionality reduction, traditional manifold learning algorithm did not consider the raw data category information, and the degree of clustering was generally at a low level, a manifold learning dimensionality reduction algorithm with supervised discriminant projection (SDP) was proposed to improve the dimensionality reduction effects of network security data.On the basis of the nearest neighbor matrix, the label information of the raw data category was exploited to construct a supervised discriminant matrix in order to translate unsupervised popular learning into supervised learning.The target was to find a low dimensional projective space with both maximum global divergence matrix and minimum local divergence matrix, ensuring that the same kind of data was concentrated and heterogeneous data was scattered after dimensionality reduction projection.The experimental results show that the SDP algorithm, compared with the traditional dimensionality reduction algorithms, can effectively remove redundant data with low time complexity.Meanwhile the data after dimensionality reduction is more concentrated, and the heterogeneous samples are more dispersed, suitable for the actual network security data analysis model.…”
Get full text
Article