Results 11 to 20 of about 120,568 (187)
Interval type-2 fuzzy automata and Interval type-2 fuzzy grammar [PDF]
The purpose of the present work is to introduce and study the concept of interval type-2 (IT2) fuzzy grammar which recognizes the given IT2 fuzzy languages. The relationship between IT2 fuzzy automata and IT2 fuzzy (weak) regular grammars is discussed.
Kavikumar, Jacob +2 more
core +1 more source
A new wireless underground network system for continuous monitoring of soil water contents [PDF]
A new stand-alone wireless embedded network system has been developed recently for continuous monitoring of soil water contents at multiple depths. This paper presents information on the technical aspects of the system, including the applied sensor ...
Elsen, H.G.M., van den +7 more
core +1 more source
Semantic Gateway as a Service architecture for IoT Interoperability [PDF]
The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and
Anantharam, Pramod +2 more
core +3 more sources
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources
Proxy dynamic delegation in grid gateway
Nowadays one of the main obstacles the research comes up against is the difficulty in accessing the required computational resources. Grid is able to offer the user a wide set of resources, even if they are often too hard to exploit for non expert end ...
Calzolari, Federico, Licari, Daniele
core +1 more source
Characteristics of WAP traffic [PDF]
This paper considers the characteristics of Wireless Application Protocol (WAP) traffic. We start by constructing a WAP traffic model by analysing the behaviour of users accessing public WAP sites via a monitoring system.
Irvine, J., Ma, I.
core +3 more sources
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
Usability testing in a library web site redesign project [PDF]
An intuitive library information gateway is critical to meeting the information needs of library users in the digital age. This article describes the process involved in redesigning a library Web site.
McMullen, Susan
core +2 more sources
The relationship between anabolic and catabolic processes governing lung cancer cell growth is nuanced. We show that ATG4B, an autophagy regulator, is elevated in lung cancer and that high ATG4B is associated with worse patient outcomes. Targeting ATG4B in cells reduces growth, protein synthesis, and mTORC1 activity, demonstrating a new relationship ...
Patrick J. Ryan +6 more
wiley +1 more source
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source

