Results 51 to 60 of about 3,609,102 (305)

Who is investing in machine-to-machine communications? [PDF]

open access: yes, 2013
Machine-to-Machine (M2M) communications refers to the automate exchange of information between devices for control and monitoring applications. This type of communication is not new since automated systems have been present for more than three decades ...
Bratu, Vlad-loan   +2 more
core  

Combined compression and encryption of linear wireless sensor network data using autoencoders

open access: yesScientific Reports
In a linear wireless sensor network (LWSN), sensor nodes are deployed in a linear fashion to monitor and gather data along a linear path or route. Generally, the base station collects the data from the contiguously placed nodes in the same order.
N. Shylashree, Sachin Kumar, Hong Min
doaj   +1 more source

Dynamic and low-dimensional modeling of brain functional connectivity on Riemannian manifolds

open access: yesNeuroImage
Modeling brain functional connectivity (FC) is key in investigating brain functions and dysfunctions. FC is typically quantified by symmetric positive definite (SPD) matrices that are located on a Riemannian manifold rather than the regular Euclidean ...
Mingyu Wang, Yueming Wang, Yuxiao Yang
doaj   +1 more source

Brain Functional Interaction of Acupuncture Effects in Diarrhea-Dominant Irritable Bowel Syndrome

open access: yesFrontiers in Neuroscience, 2020
Acupuncture is a traditional Chinese medicine treatment that has widely been used to modulate gastrointestinal dysfunction caused by irritable bowel syndrome (IBS) and to alleviate the resulting pain.
Kai Ma   +8 more
doaj   +1 more source

Machinability Comparison of TiCN-Al2O3-TiN, TiAlN-TiN, and TiAlSiN Coated Carbide Inserts in Turning Hardened AISI 4340 Steel Using Grey-Crow Search Hybrid Optimization

open access: yesMetals, 2023
This experimental study presents the machinability comparison of TiCN-Al2O3-TiN, TiAlN-TiN, and TiAlSiN coated carbide inserts in hard turning AISI 4340 steel.
Mohammed Al Awadh   +5 more
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

ALOHA Random Access that Operates as a Rateless Code [PDF]

open access: yes, 2013
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices.
Popovski, Petar, Stefanovic, Cedomir
core   +2 more sources

The AENEAS Project: Intraoperative Anatomical Guidance Through Real-Time Landmark Detection Using Machine Vision

open access: yesMayo Clinic Proceedings: Digital Health
Objective: To investigate the performance of a deep learning machine vision-based model in identifying anatomical landmarks in a complex microsurgical setting, such as the pterional trans-Sylvian approach.
Simone Olei, MD   +7 more
doaj   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Multiuser Detection by MAP Estimation with Sum-of-Absolute-Values Relaxation

open access: yes, 2015
In this article, we consider multiuser detection that copes with multiple access interference caused in star-topology machine-to-machine (M2M) communications. We assume that the transmitted signals are discrete-valued (e.g.
Hayashi, Kazunori   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy