Results 71 to 80 of about 23,946 (190)

Equal Time, Unequal Labor Division: Adolescents' Domestic Labor Time During the COVID‐19 Pandemic

open access: yesSociological Inquiry, EarlyView.
While existing research offers mixed evidence on how the COVID‐19 pandemic affected adults' division of housework, adolescents have remained largely overlooked in this regard. Using nationally representative data from the 2019–2021 American Time Use Survey and Current Population Survey, this study examines changes in adolescents' unpaid labor before ...
Suyeon Park Jang
wiley   +1 more source

Efficient Reversible Data Hiding in Encrypted Point Clouds via KD Tree-Based Path Planning and Dual-Model Design

open access: yesMathematics
Reversible data hiding in encrypted point clouds presents unique challenges due to their unstructured geometry, absence of mesh connectivity, and high sensitivity to spatial perturbations. In this paper, we propose an efficient and secure reversible data
Yuan-Yu Tsai   +3 more
doaj   +1 more source

VLSI Implementation of an Efficient Lossless EEG Compression Design for Wireless Body Area Network

open access: yesApplied Sciences, 2018
Data transmission of electroencephalography (EEG) signals over Wireless Body Area Network (WBAN) is currently a widely used system that comes together with challenges in terms of efficiency and effectivity.
Chiung-An Chen   +3 more
doaj   +1 more source

Real-time demonstration hardware for enhanced DPCM video compression algorithm [PDF]

open access: yes
The lack of available wideband digital links as well as the complexity of implementation of bandwidth efficient digital video CODECs (encoder/decoder) has worked to keep the cost of digital television transmission too high to compete with analog methods.
Bizon, Thomas P.   +2 more
core   +1 more source

Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

open access: yes, 2010
Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of the radio channel are major targets
Andreas Reinhardt 0001   +5 more
openaire   +2 more sources

Intramuscular pathways of maladaptation in overtraining syndrome

open access: yesThe Journal of Physiology, EarlyView.
Abstract figure legend The transition from adaptive overreaching to maladaptive overtraining and mechanisms through which excessive training load can lead to performance decline. Four interconnected pathophysiological domains are highlighted: neural fatigue, involving both central and peripheral components such as altered sensory feedback and reflex ...
Emily Shorter   +4 more
wiley   +1 more source

Probability updating-based adaptive hybrid coding

open access: yesTongxin xuebao, 2008
A probability updating mechanism was proposed for entropy coding. To achieve the best coding efficiency,probability updating based huffman code and structured code were jointly used,and the best context model was selected according as the correlation of ...
doaj   +2 more sources

The flexible, the stereotyped and the in‐between: putting together the combinatory tool use origins hypothesis

open access: yesBiological Reviews, Volume 101, Issue 3, Page 1235-1254, June 2026.
ABSTRACT Tool use research has long made the distinction between tool using that is considered learned and flexible, and that which appears to be instinctive and stereotyped. However, animals with an inherited tool use specialisation can exhibit flexibility, while tool use that is spontaneously innovated can be limited in its expression and facilitated
Jennifer A. D. Colbourne   +1 more
wiley   +1 more source

Pemampatan Citra Keabuan dengan Algoritma Adaptive Huffman dan LZW

open access: yesJurnal Teknik ITS, 2017
Perkembangan data digital cukuplah pesat, mulai dari ukuran hingga jenis berkas. Untuk mengimbangi hal tersebut maka perlu ada-nya algoritma pemampatan guna mengurangi ukuran penggunaan media penyimpanan.
Djuned Fernando Djusdek   +2 more
doaj  

REYHealth: Confidentiality-Preserving electronic health records sharing using adaptive N-Image steganography and huffman coding

open access: yesResults in Engineering
In past few years, the digital transmission technology has rapidly evolved. One major developments is the sharing of Electronic Health Records (EHRs) in telemedicine, increasing the risk of privacy leaks.
Reynandriel Pramas Thandya   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy