Suggested Topics within your search.
Suggested Topics within your search.
- Personnel management 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Community development 1
- Critical Care 1
- Critical care medicine 1
- Diagnostic ultrasonic imaging 1
- Economic development 1
- Electronic circuits 1
- Examinations 1
- French language 1
- Medical economics 1
- Medicine 1
- TECHNOLOGY & ENGINEERING / General 1
- Ultrasonography 1
-
4481
Antenna azimuth diagnosis based on multi-layer perceptron model
Published 2021-04-01“…Antenna azimuth was seen as a key factor in the quality of mobile communications, and its accuracy will directly affect the quality of network optimization.An antenna azimuth diagnosis method was proposed based on multi-layer perceptron.The azimuth was divided into 12 interval classes, each class covered a range of 30°, that was,[0, 30°) was recorded as class 0, …,[330°, 360°) was recorded as class 11.The multi-layer perceptron algorithm was used to identify the range of the antenna azimuth angle and automatically identify the angle range of the antenna azimuth angle, which provided effective data support for the network optimization engineer to determine the actual network coverage problem, and greatly reduced workload and labor cost in verifying antenna performance.Experimental results show that the method can effectively and quickly discriminate the antenna azimuth interval class, and the recognition accuracy reaches 92.6%, which is higher than the classification accuracy of random forest and logistic regression classification algorithms.…”
Get full text
Article -
4482
FULFILLMENT OF THE RIGHT TO HEALTH SERVICES FOR PRISONERS IN OVERCROWDED CONDITIONS
Published 2025-04-01“…Although the quality and coverage of these basic health treatments are still insufficient to satisfy the needs of all prisoners, they are nonetheless offered. …”
Get full text
Article -
4483
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01“…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
Get full text
Article -
4484
Biological and ecological aspects of Xantusia sanchezi, an endangered lizard in an oak forest in the state of Jalisco, Mexico
Published 2012-03-01“…Habitat characterization was made using a coverage analysis. A total of 29 individuals were captured with 7 re-captures. …”
Get full text
Article -
4485
IoT business guarantee method based on behavioral portrait
Published 2021-05-01“…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
Get full text
Article -
4486
Research on 5G upstream bandwidth detection technology and application
Published 2021-12-01“…A scheme of 5G upstream bandwidth detection technology and application was proposed, which could effectively solve the problem of 5G network fluctuation in video monitoring data transmission process.It will help the deployment of 5G video monitoring application.By obtaining the radio resource information of 5G NR, the terminal can count the transmission resource and estimate the change trend of uplink bandwidth.Combined with the intelligent coding technology and bit-stream adaptive technology of streaming media application, the scheme ensures no stuck and continuous picture at the cost of losing a little video definition, and ensures the overall experience of customers.The scheme can be widely used in the scene of heavy 5G public service, large network fluctuation and wide network coverage, such as campus video surveillance.…”
Get full text
Article -
4487
Reimagining Journalism to Help Save Democracy and Fight Trumpism
Published 2018-12-01“… This manifesto examines the discourse used by journalists in their coverage leading up to and following Donald Trump’s ascendancy to the presidency in the United States. …”
Get full text
Article -
4488
Interference coexistence between wireless meter reading system in 470~510 MHz band and adjacent systems
Published 2017-01-01“…Current RF specification restrains the wireless meter reading system (WMRS) working in 470~510 MHz band.It is incapable of meeting new communication speed and coverage requirements of power network.Under the premise of ensuring that prior used communication systems in adjacent band work without interference,how to modify the related RF specification to improve communication ability of WMRS is one of the problems to be solved at present.Firstly,the domestic frequency spectrum allocation in 450~566 MHz band was analyzed.Then,based on RF parameters of 3 kinds of WMRS from State Grid and deterministic computation and ray tracing simulation method,the interference coexistence between the WMRS and adjacent communication systems,which including broadcast television system,CDMA450 system,railway train dispatching system and FDD-LTE system was studied.At last,some suggestions for revision of relevant RF specifications were obtained.…”
Get full text
Article -
4489
Data transmission algorithm of vehicle Ad Hoc network based on channel switching
Published 2018-10-01“…A data transmission algorithm of vehicle Ad Hoc network based on channel switching (DTA) was proposed.In the DTA,three network layers were considered,such as vehicle nodes,relay nodes and sink nodes.The vehicle nodes were classified by the information of vehicle’s driving direction.The vehicle nodes channel distribution and switching mechanism was proposed to reduce the interference of communication.Then a rapid transmission of relay nodes was proposed.A priority transmission method for emergency information was proposed to classify data with different queues and send data as their queues’ priority.Simulation results show that DTA can effectively achieve the rapid transmission of useful information,reduce unnecessary losses of energy,improve the data received rate of sink nodes,reduce the average hop number of data packets and improve coverage rate of data transmission.Under certain conditions,DTA is better than AODV and AODV-L algorithm,and is more suitable for vehicle driving environment of rapid change.…”
Get full text
Article -
4490
Mental health in the context of the family health program: social representations of users and family members
Published 2008-06-01“…The data were collected using the Free Word Association Test, processed on Tri-deux-mots software and interpreted through correspondence factor analysis. …”
Get full text
Article -
4491
Preparation and Adsorption Studies of High Specific Surface Area Activated Carbons Obtained from the Chemical Activation of Jute Stick
Published 2006-11-01“…High specific surface area activated carbon has been produced from the chemical activation of jute stick using H 3 PO 4 as an activating agent at different temperatures in the range 673–973 K. …”
Get full text
Article -
4492
A short note on cue validity
Published 2025-06-01“…In questionnaire development, content validity is usually operationalized by using items that comprehensively express all aspects of the object of measurement. …”
Get full text
Article -
4493
Georgians at risk: Understanding variations in 2020 U. S. Census self-response rates.
Published 2021-08-01“…This research study uses correlation analysis and simple regression analysis to determine if the historical patterns of underrepresentation of hard-to-count populations improved in 2020 with the changes in counting methods. …”
Get full text
Article -
4494
Twenty years′ follow-up of a de-epithelialised turnover flap
Published 2008-07-01“…The authors have used the de-epithelialised turnover flap (Thatte′s Flap) for covering compound defects over the tendo-achilles in 31 patients in the period covering 1980-2000. …”
Get full text
Article -
4495
Twenty years′ follow-up of a de-epithelialised turnover flap
Published 2008-01-01“…The authors have used the de-epithelialised turnover flap (Thatte′s Flap) for covering compound defects over the tendo-achilles in 31 patients in the period covering 1980-2000. …”
Get full text
Article -
4496
Backhaul carrying scheme of TD-LTE microcell base station
Published 2016-04-01“…The deployment scenario,coverage strategy and site assignment of TD-LTE microcell base station(MiBS) are different from macrocell base station(MaBS). …”
Get full text
Article -
4497
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01“…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
Get full text
Article -
4498
m-Polar Quadripartitioned Neutrosophic Graphs with Applications in Decision-Making for Mobile Network Selection
Published 2025-05-01“…Additionally, recognizing the complexity of selecting a mobile network shaped by factors like coverage, data speed, pricing, and customer service-we propose a novel decision-making approach using a score function within the framework of m-polar quadripartitioned neutrosophic sets. …”
Get full text
Article -
4499
Empire and the megamachine: comparing two controversies over social media content
Published 2019-03-01“…This paper presents the results of a thematic analysis of hearings held before the US senate in 2017 with representatives of social media companies and close coverage from industry groups of advertising boycotts of social media. …”
Get full text
Article -
4500
Expanding risks: Medicaid expansion and data security.
Published 2025-01-01“…The Patient Protection and Affordable Care Act of 2010 led to the largest expansion of healthcare coverage since the instantiation of Medicare and Medicaid in 1965. …”
Get full text
Article