Results 21 to 30 of about 5,588,014 (295)
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti +8 more
core +1 more source
Visual Place Recognition Pre-Training for End-to-End Trained Autonomous Driving Agent
End-to-end autonomous driving often relies on the concept of learning to imitate from expert demonstrations. Since those demonstrations cannot cover all possible variations in data, there always are situations where the trained agents encounter unseen ...
Shubham Juneja +2 more
doaj +1 more source
Application of a Task Stalling Buffer in Distributed Hybrid Cloud Computing
The purpose of the research is to create a hybrid cloud platform that performs distributed computing tasks using high-performance servers and volunteer computing resources.
Albertas Jurgelevicius +2 more
doaj +1 more source
Digital data command bus [PDF]
Command bus constructed from coaxial cable has short segments of its outer jacket and shield removed and replaced with small ferrite cores carrying multiturn windings connected to decoder.
Milligan, G. C.
core +1 more source
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
This work aimed to automate the current manual inspection process of orthopedic joint reconstruction loaner trays, which contain multiple components securely placed in designated slots, by developing an end-to-end pipeline, including an object detection ...
Reyhaneh Nosrati +5 more
doaj +1 more source
Digital slope-threshold data compressor [PDF]
Slope-threshold compression scheme for telemetered video data is efficient, and its principle of operation is as follows: when slope of raw data exceeds threshold decision reference, previous sample is transmitted.
Anderson, T. O.
core +1 more source
Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley +1 more source
Evaluating the impact of a national handwashing campaign in Wales using propensity score matching
Introduction Hand hygiene promotion is one of the most cost-effective health actions to reduce the transmission of infectious diseases. Welsh Government commissioned Public Health Wales to deliver a public-facing, preventative behaviours communications ...
Alex Christensen +3 more
doaj +1 more source
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley +1 more source

