Results 91 to 100 of about 9,451,730 (348)

Fast Parallel Implementation for Random Network Coding on Embedded Sensor Nodes

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Network coding is becoming essential part of network systems since it enhances system performance in various ways. To take full advantage of network coding, however, it is vital to guarantee low latency in the decoding process and thus parallelization of
Seong-Min Choi   +2 more
doaj   +1 more source

Ergodic sum-rate analysis for multicast network with wireless energy harvesting relay

open access: yesThe Journal of Engineering, 2019
In the letter, a wireless energy harvesting (WEH) multicast network is proposed. Two source nodes communicate with their respective destination nodes via a WEH relay node.
Yingting Liu   +4 more
doaj   +1 more source

The network of French legal codes [PDF]

open access: yesProceedings of the 12th International Conference on Artificial Intelligence and Law, 2009
We propose an analysis of the codified Law of France as a structured system. Fifty two legal codes are selected on the basis of explicit legal criteria and considered as vertices with their mutual quotations forming the edges in a network which properties are analyzed relying on graph theory. We find that a group of 10 codes are simultaneously the most
Mazzega, Pierre   +2 more
openaire   +5 more sources

MicroRNA 196a contributes to the aggressiveness of esophageal adenocarcinoma through the MYC/TERT/NFκB axis

open access: yesMolecular Oncology, EarlyView.
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo   +8 more
wiley   +1 more source

Entropy of Closure Operators and Network Coding Solvability

open access: yesEntropy, 2014
The entropy of a closure operator has been recently proposed for the study of network coding and secret sharing. In this paper, we study closure operators in relation to their entropy. We first introduce four different kinds of rank functions for a given
Maximilien Gadouleau
doaj   +1 more source

Coding Opportunity Densification Strategies for Instantly Decodable Network Coding [PDF]

open access: yes, 2013
In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an ...
Sameh Sorour   +2 more
core  

Quantum network coding for quantum repeaters

open access: yes, 2012
This paper considers quantum network coding, which is a recent technique that enables quantum information to be sent on complex networks at higher rates than by using straightforward routing strategies. Kobayashi et al. have recently showed the potential
François Le Gall   +8 more
core   +1 more source

Comprehensive omics‐based classification system in adult patients with B‐cell acute lymphoblastic leukemia

open access: yesMolecular Oncology, EarlyView.
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song   +11 more
wiley   +1 more source

A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks

open access: yesSensors, 2011
Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health ...
Abraham O. Fapojuwo, Emeka E. Egbogah
doaj   +1 more source

Home - About - Disclaimer - Privacy