Results 11 to 20 of about 4,484,297 (341)

Longitudinal predictors of weapon involvement in middle adolescence: Evidence from the UK Millennium Cohort Study

open access: yesAggressive Behavior, Volume 49, Issue 1, Page 5-14, January 2023., 2023
Abstract This study uses longitudinal data from the UK Millennium Cohort Study (N = 13,277) to examine the childhood and early adolescence factors that predict weapon involvement in middle adolescence, which in this study is exemplified by having carried or used a weapon.
Aase Villadsen, Emla Fitzsimons
wiley   +1 more source

Evaluation of intrafraction couch shifts for proton treatment delivery in head‐and‐neck cancer patients: Toward optimal imaging frequency

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose Treatment planning for head‐and‐neck (H&N) cancer, in particular oropharynx, nasopharynx, and paranasal sinus cases, at our center requires noncoplanar proton beams due to the complexity of the anatomy and target location. Targeting accuracy for all beams is carefully evaluated by using image guidance before delivering proton beam ...
Nrusingh C. Biswal   +5 more
wiley   +1 more source

Well‐being on supportive techniques in amyotrophic lateral sclerosis: from neurologists' perspective

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1874-1883, December 2022., 2022
Abstract Objective To investigate intercultural neurologists' perception of well‐being in patients with amyotrophic lateral sclerosis (ALS) using gastrostomy (PEG), non‐invasive, and/or invasive ventilation (NIV/IV) and to analyse the determinants and impact on the management of the above medical interventions (MIs).
Krzysztof Barć   +7 more
wiley   +1 more source

ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices [PDF]

open access: yes2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2017
We introduce an extremely computation-efficient CNN architecture named ShuffleNet, which is designed specially for mobile devices with very limited computing power (e.g., 10-150 MFLOPs).
Xiangyu Zhang   +3 more
semanticscholar   +1 more source

Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks

open access: yesIEEE Access, 2019
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang   +7 more
doaj   +1 more source

A Survey on Mobile Edge Computing: The Communication Perspective

open access: yesIEEE Communications Surveys and Tutorials, 2017
Driven by the visions of Internet of Things and 5G communications, recent years have seen a paradigm shift in mobile computing, from the centralized mobile cloud computing toward mobile edge computing (MEC).
Yuyi Mao   +4 more
semanticscholar   +1 more source

Dimensionality Reduction for Human Activity Recognition Using Google Colab

open access: yesInformation, 2020
Human activity recognition (HAR) is a classification task that involves predicting the movement of a person based on sensor data. As we can see, there has been a huge growth and development of smartphones over the last 10–15 years—they could be used as a
Sujan Ray   +2 more
doaj   +1 more source

Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2015
Mobile-edge cloud computing is a new paradigm to provide cloud computing capabilities at the edge of pervasive radio access networks in close proximity to mobile users.
Xu Chen   +3 more
semanticscholar   +1 more source

Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach

open access: yesIEEE Access, 2023
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil   +3 more
doaj   +1 more source

Publishing Node Strength Distribution With Node Differential Privacy

open access: yesIEEE Access, 2020
The challenge of graph data publishing under node-differential privacy mainly comes from the high sensitivity of the query. Compared with edge-differential privacy that can only protect the relationship between people, node-differential privacy can ...
Ganghong Liu, Xuebin Ma, Wuyungerile Li
doaj   +1 more source

Home - About - Disclaimer - Privacy