Results 51 to 60 of about 103,525 (265)

Awareness on Newly Initiated Government Schemes and Utilization Among Village People

open access: yesOnline Journal of Health & Allied Sciences, 2018
Objective: To assess the awareness on newly initiated government schemes, to find the utilization of those, to find the association between awareness on newly initiated government schemes and selected variables and also the association between ...
Manjula Amin   +7 more
doaj  

A user application-based access point selection algorithm for dense WLANs.

open access: yesPLoS ONE, 2019
The current commercial access point (AP) selection schemes are mostly based on received signal strength, but perform poorly in many situations. To address this problem, a number of alternative schemes collect and analyze the actual load of every ...
Mun-Suk Kim   +4 more
doaj   +1 more source

Performance Analysis in Heterogeneous Networks with Spatiotemporal Traffic and Scheduling

open access: yesApplied Sciences, 2020
In this work, we consider interference performance under direct data transmission in a heterogeneous network. The heterogeneous network consists of K-tier base stations and users, whose locations follow independent Poisson point processes (PPPs).
Jianfang Xin   +4 more
doaj   +1 more source

Uniform Mixing and Association Schemes

open access: yesThe Electronic Journal of Combinatorics, 2017
We consider continuous-time quantum walks on distance-regular graphs. Using results about the existence of complex Hadamard matrices in association schemes, we determine which of these graphs have quantum walks that admit uniform mixing.First we apply a result due to Chan to show that the only strongly regular graphs that admit instantaneous uniform ...
Godsil, Chris   +2 more
openaire   +3 more sources

Congruences associated with DOL-schemes [PDF]

open access: yesProceedings of the American Mathematical Society, 1988
For a DOL-scheme ( X , φ ) (X,\varphi ) , where X X is a finite alphabet and φ \varphi is an endomorphism of X ∗ {X^*} , we study the properties of the congruence φ ¯
Petrich, Mario, Thierrin, Gabriel
openaire   +2 more sources

Efficacy and Tolerability of Topotecan/Cyclophosphamide/Dinutuximab in Relapsed and Refractory High‐Risk Neuroblastoma: A Multi‐Institutional Retrospective Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Chemoimmunotherapy with irinotecan, temozolomide, and dinutuximab (I/T/DIN) has emerged as first‐line therapy for relapsed/refractory (r/r) high‐risk neuroblastoma (HRNB) in North America. Topotecan and cyclophosphamide (T/C) are often used in combination with dinutuximab in the setting of lack of response, progression, or incomplete ...
Benjamin J. Lerman   +17 more
wiley   +1 more source

Cross-Entropy Method for Content Placement and User Association in Cache-Enabled Coordinated Ultra-Dense Networks

open access: yesEntropy, 2019
Due to the high splitting-gain of dense small cells, Ultra-Dense Network (UDN) is regarded as a promising networking technology to achieve high data rate and low latency in 5G mobile communications.
Jia Yu   +5 more
doaj   +1 more source

Functors from association schemes

open access: yesJournal of Combinatorial Theory, Series A, 2013
We construct a wide subcategory of the category of finite association schemes with a collection of desirable properties. Our subcategory has a first isomorphism theorem analogous to that of groups. Also, standard constructions taking schemes to groups (thin radicals and thin quotients) or algebras (adjacency algebras) become functorial when restricted ...
openaire   +2 more sources

Clinical Course and Impact of Breaks in Therapy for Children With Relapsed/Refractory Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Pediatric relapsed or refractory (R/R) solid tumors carry a dismal prognosis, and postrelapse patient experiences are not well described. We present postrelapse outcomes, including number of R/R events and subsequent therapy regimens.
Matthew T. McEvoy   +5 more
wiley   +1 more source

Graph Crypto-Stego System for Securing Graph Data Using Association Schemes

open access: yesJournal of Applied Mathematics
Cryptography has recently become a critical area to research and advance in order to transmit information safely and securely among various entities, especially when the transmitted data is classified as crucial or important.
Anuradha Sabharwal   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy