Results 51 to 60 of about 3,609,102 (305)
Who is investing in machine-to-machine communications? [PDF]
Machine-to-Machine (M2M) communications refers to the automate exchange of information between devices for control and monitoring applications. This type of communication is not new since automated systems have been present for more than three decades ...
Bratu, Vlad-loan +2 more
core
Combined compression and encryption of linear wireless sensor network data using autoencoders
In a linear wireless sensor network (LWSN), sensor nodes are deployed in a linear fashion to monitor and gather data along a linear path or route. Generally, the base station collects the data from the contiguously placed nodes in the same order.
N. Shylashree, Sachin Kumar, Hong Min
doaj +1 more source
Dynamic and low-dimensional modeling of brain functional connectivity on Riemannian manifolds
Modeling brain functional connectivity (FC) is key in investigating brain functions and dysfunctions. FC is typically quantified by symmetric positive definite (SPD) matrices that are located on a Riemannian manifold rather than the regular Euclidean ...
Mingyu Wang, Yueming Wang, Yuxiao Yang
doaj +1 more source
Brain Functional Interaction of Acupuncture Effects in Diarrhea-Dominant Irritable Bowel Syndrome
Acupuncture is a traditional Chinese medicine treatment that has widely been used to modulate gastrointestinal dysfunction caused by irritable bowel syndrome (IBS) and to alleviate the resulting pain.
Kai Ma +8 more
doaj +1 more source
This experimental study presents the machinability comparison of TiCN-Al2O3-TiN, TiAlN-TiN, and TiAlSiN coated carbide inserts in hard turning AISI 4340 steel.
Mohammed Al Awadh +5 more
doaj +1 more source
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
ALOHA Random Access that Operates as a Rateless Code [PDF]
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices.
Popovski, Petar, Stefanovic, Cedomir
core +2 more sources
Objective: To investigate the performance of a deep learning machine vision-based model in identifying anatomical landmarks in a complex microsurgical setting, such as the pterional trans-Sylvian approach.
Simone Olei, MD +7 more
doaj +1 more source
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
Multiuser Detection by MAP Estimation with Sum-of-Absolute-Values Relaxation
In this article, we consider multiuser detection that copes with multiple access interference caused in star-topology machine-to-machine (M2M) communications. We assume that the transmitted signals are discrete-valued (e.g.
Hayashi, Kazunori +2 more
core +1 more source

