Showing 581 - 600 results of 928 for search 'Datsun~', query time: 4.19s Refine Results
  1. 581

    6G knowledge system construction: academic knowledge mining and on-demand application for full domains and omni scenarios by Zifan SHA, Nan CHENG, Yilong HUI, Wenwei YUE, Yuchuan FU, Ruijin SUN

    Published 2023-09-01
    “…At present, the concepts related to 6G have not been unified, and there is an urgent need for consistent cognition and definition.Academics and industries lack a clear understanding of the overall development of 6G and the research progress in related fields.Therefore, the 6G knowledge base and knowledge system was constructed.Firstly, the existing 6G academic documents were automatically screened and stored in a structured way.Secondly, a 6G knowledge base was constructed on the basis of labeling and standardizing text data.In addition, a comprehensive statistical analysis was conducted across all domains of 6G based on the knowledge base and the technologies such as natural language processing, deep neural network and latent tree model were used to realize the extraction and generation of 6G knowledge.Finally, on the basis of large-scale model training, the on-demand knowledge application was realized for diversified service requirements.…”
    Get full text
    Article
  2. 582

    Boublil and Daigle. Nietzsche and Phenomenology: Power, Life, Subjectivity. 2013 by Diogo Heber Albino de Almeida

    Published 2015-06-01
    “…This book has the contribution of some significant authors on related studies, as – besides organizers, Rodolf Boehm, Françoise Dastur, Babette Babich Keith Ansell-Pearson, Didier Franck, Lawrence J. …”
    Get full text
    Article
  3. 583

    Synthesis of Organic Ligands via Reactions of 4-Benzoyl-5-phenylamino-2,3-dihydrothiophene-2,3-dione with N-Nucleophiles by Hassan Kabirifard, Pardis Hafez Taghva, Hossein Teimouri, Niloofar Koosheshi, Parastoo Javadpour, Hanieh Bagherinejad, Soheila Seyfi, Maryam Hossein Roodbari, Elaheh Golabian

    Published 2020-01-01
    “…The reaction of 4-benzoyl-5-phenylamino-2,3-dihydrothiophene-2,3-dione (1) with aminoheteroaryls, lamotrigine, 1,3-diaminoheteroaryls, dapsone, NH2R (hydroxylamine, DL-1-phenylethylamine, and metformin), and 4,4′-bipyridine in THF/H2O (1 : 1) at room temperature led to 3-N-phenylthiocarbamoyl-2-butenamides 2–5, while that with naphthylamines and 1,3-phenylenediamine in ethanol at high temperature led to 5-phenylamino-2,5-dihydrothiophene-2-ones 6–8 as organic ligands in the medium to good yields. …”
    Get full text
    Article
  4. 584

    Anomalias na distribuição geográfica dos dados de saúde da bacia hidrográfica do Ribeirão Lindóia, zona norte do município de Londrina/PR by Paulo Rogério Araujo, José Paulo Peccinini Pinese

    Published 2012-03-01
    “…Aiming at characterizing the geographic distribution of health data of Ribeirão Lindóia Basin, in Londrina City in Paraná, Brazil, correlating the possible patterns of hydro geochemical anomalies, geochemical parameters of water quality were analyzed through the Atomic Emission Spectrometry with Inductively Coupled Argon Plasma (SiO4-4, Fe3+, Zn2+, PO3-4, Al3+) and the Atomic Absorption Spectrometry (Na+ e K+). For Datasus information crossings and spatial organization of health data, the Philcarto software was used, highlighting Dengue fever, Viral Hepatitis and Meningitis attendance in the period from 2000 to 2004. …”
    Get full text
    Article
  5. 585

    A scoping review of the landscape of health-related open datasets in Latin America. by David Restrepo, Justin Quion, Constanza Vásquez-Venegas, Cleva Villanueva, Leo Anthony Celi, Luis Filipe Nakayama

    Published 2023-10-01
    “…The review found 61 datasets from 23 countries, with the DATASUS dataset from Brazil contributing to the majority of articles. …”
    Get full text
    Article
  6. 586

    言語と、風景を形作る行為: 夏目漱石の作品における風景および環境への意識 by Agathe Tran アガタ・トラン

    Published 2020-12-01
    “…This article approaches the literary dimension of landscape action through the example of Natsume Sōseki, a major Japanese author of the beginning of the 20th century. …”
    Get full text
    Article
  7. 587

    Treatment of Bullous Systemic Lupus Erythematosus by Lihua Duan, Liying Chen, Shan Zhong, Ying Wang, Yan Huang, Yan He, Jie Chen, Guixiu Shi

    Published 2015-01-01
    “…BSLE patients with corticosteroids treatment constantly do not receive a marked improvement, while dapsone generally dramatically improved the skin condition. …”
    Get full text
    Article
  8. 588

    Survey on user authentication protocol in wireless sensor network by Wei-dong FANG, Wu-xiong ZHANG, Lian-hai SHAN, Wei HE, Wei CHEN

    Published 2017-01-01
    “…For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. …”
    Get full text
    Article
  9. 589

    Efficient and privacy-preserving online face authentication scheme by Ming LI, Xiaopeng YANG, Hui ZHU, Fengwei WANG, Qi LI

    Published 2020-05-01
    “…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
    Get full text
    Article
  10. 590

    Metodeveilederen i Nav<subtitle>støttespiller, kunnskapsmegler og fanebærer</subtitle> by Karianne Nyheim Stray, Talieh Sadeghi, Mette Sønderskov

    Published 2025-01-01
    “…Vi diskuterer dilemmaene i lys av translasjonsteori og finner at metodeveilederne fungerer som translatører, kunnskapsmeglere og fanebærere i en hybrid organisatorisk kontekst. De kvantitative dataene ble samlet inn ved hjelp av Mentimeter, som er lite brukt i forskningsøyemed.…”
    Get full text
    Article
  11. 591

    Heat and Helium-3 Fluxes from Teide Volcano, Canary Islands, Spain by Mar Alonso, Eleazar Padrón, Hirochika Sumino, Pedro A. Hernández, Gladys V. Melián, María Asensio-Ramos, Fátima Rodríguez, Germán Padilla, Marta García-Merino, Cecilia Amonte, Nemesio M. Pérez

    Published 2019-01-01
    “…The thermal energy released from Teide summit cone by diffuse degassing was 2.2 MW, and the heat flux calculated through Dawson’s method was 8.1 MW, difference due to the comparison of purely convective areas as the crater with diffusive areas as the flanks of the volcano. …”
    Get full text
    Article
  12. 592

    Pyoderma Gangrenosum in Two Successive Pregnancies Complicating Caesarean Wound by Sapna Vinit Amin, Neha Bajapai, Ashwini Pai, Sunanda Bharatnur, Shripad Hebbar

    Published 2014-01-01
    “…She responded well to local wound care, oral Prednisolone, and Dapsone and made a good recovery. Pregnancy being an immunologically altered status can play a role in development of pyoderma gangrenosum and one should always rule out its possibility when there is a delayed wound healing.…”
    Get full text
    Article
  13. 593

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE) and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE). …”
    Get full text
    Article
  14. 594

    CBFM:cutted Bloom filter matrix for multi-dimensional membership query by Yong WANG, Xiao-chun YUN, ANGShu-peng WANG, Xi WANG

    Published 2016-03-01
    “…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
    Get full text
    Article
  15. 595
  16. 596
  17. 597

    High-performance federated continual learning algorithm for heterogeneous streaming data by Hui JIANG, Tianliu HE, Min LIU, Sheng SUN, Yuwei WANG

    Published 2023-05-01
    “…Aiming at the problems of poor model performance and low training efficiency in training streaming data of AI models that provide intelligent services, a high-performance federated continual learning algorithm for heterogeneous streaming data (FCL-HSD) was proposed in the distributed terminal system with privacy data.In order to solve the problem of the current model forgetting old data, a model with dynamically extensible structure was introduced in the local training stage, and an extension audit mechanism was designed to ensure the capability of the AI model to recognize old data at the cost of small storage overhead.Considering the heterogeneity of terminal data, a customized global model strategy based on data distribution similarity was designed at the central server side, and an aggregation-by-block manner was implemented for different modules of the model.The feasibility and effectiveness of the proposed algorithm were verified under various data increment scenarios with different data sets.Experimental results show that, compared with existing works, the proposed algorithm can effectively improve the model performance to classify old data on the premise of ensuring the capability to classify new data.…”
    Get full text
    Article
  18. 598

    Le jeu vidéo au défi de l’œuvre d’art by Pascal Krajewski

    Published 2021-03-01
    “…Car cette cartographie n’est pas sans rapper l’esthétique goodmanienne, qui offre cinq critères d’articité : densité syntaxique, densité sémantique, saturation relative, exemplification et référence multiple et complexe.Dès lors, s’il est bien convenable de parler du jeu vidéo comme d’un art, il devient concevable de chercher les qualités propres de l’œuvre d’art vidéoludique, ses spécificités, qu’elle ne partage avec celle d’aucun autre médium. Nous proposons d’en retenir deux : le défi et l’implication.…”
    Get full text
    Article
  19. 599

    Public key searchable encryption scheme in blockchain-enabled multi-user environment by Dong ZHENG, Tianze ZHU, Rui GUO

    Published 2021-10-01
    “…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
    Get full text
    Article
  20. 600

    Reduction algorithm based on supervised discriminant projection for network security data by Fangfang GUO, Hongwu LYU, Weilin REN, Ruini WANG

    Published 2021-06-01
    “…In response to the problem that for dimensionality reduction, traditional manifold learning algorithm did not consider the raw data category information, and the degree of clustering was generally at a low level, a manifold learning dimensionality reduction algorithm with supervised discriminant projection (SDP) was proposed to improve the dimensionality reduction effects of network security data.On the basis of the nearest neighbor matrix, the label information of the raw data category was exploited to construct a supervised discriminant matrix in order to translate unsupervised popular learning into supervised learning.The target was to find a low dimensional projective space with both maximum global divergence matrix and minimum local divergence matrix, ensuring that the same kind of data was concentrated and heterogeneous data was scattered after dimensionality reduction projection.The experimental results show that the SDP algorithm, compared with the traditional dimensionality reduction algorithms, can effectively remove redundant data with low time complexity.Meanwhile the data after dimensionality reduction is more concentrated, and the heterogeneous samples are more dispersed, suitable for the actual network security data analysis model.…”
    Get full text
    Article