Results 31 to 40 of about 1,605,280 (279)

Effect analysis of antenna translation vibration on GEO SARimage

open access: yesThe Journal of Engineering, 2019
Due to the high orbital altitude, the large-area antenna and solar array will be utilised in geosynchronous synthetic aperture radar (GEO SAR) to meet the requirement of high transmitting power.
Tianyi Zhang   +5 more
doaj   +1 more source

Learning Robot Speech Models to Predict Speech Acts in HRI

open access: yesPaladyn, 2016
In order to be acceptable and able to “camouflage” into their physio-social context in the long run, robots need to be not just functional, but autonomously psycho-affective as well. This motivates a long term necessity of introducing behavioral autonomy
Arora Ankuj   +3 more
doaj   +1 more source

Donation after Cardiocirculatory Death: A program that we must implement. Experts Argentinean meeting report

open access: yesTransplantation Reports, 2023
The global organ transplant activity remains satisfying less than 10% of the total number of patients in the waiting list. Brain dead donors and living donors have been the most common source of organs used worldwide.
Pablo Farinelli   +15 more
doaj   +1 more source

Clinical profile and growth pattern of children with congenital adrenal hyperplasia attending endocrine clinic, in a tertiary care center, South India

open access: yesNational Journal of Physiology, Pharmacy and Pharmacology
Background: Congenital adrenal hyperplasia (CAH) is a group of autosomal recessive disorders that result from the deficiency of one of several enzymes involved in the steroidogenic pathway for cortisol or aldosterone biosynthesis.
Asheem Kudukkil Nediyarathil   +2 more
doaj   +1 more source

Integrating Conflict Driven Clause Learning to Local Search

open access: yes, 2009
This article introduces SatHyS (SAT HYbrid Solver), a novel hybrid approach for propositional satisfiability. It combines local search and conflict driven clause learning (CDCL) scheme. Each time the local search part reaches a local minimum, the CDCL is
Bertrand Mazure   +5 more
core   +3 more sources

Transient Neonatal Hyperparathyroidism Unfolding a Noteworthy Cause: A Series of Four Cases [PDF]

open access: yesJournal of Clinical and Diagnostic Research
Transient Neonatal Hyperparathyroidism (TNHP) is an abnormal bone disorder caused by impaired maternal-foetal calcium transport across the placenta, leading to inadequate foetal bone mineralisation.
AO Vinitha   +4 more
doaj   +1 more source

Proteus: A Hierarchical Portfolio of Solvers and Transformations

open access: yes, 2014
In recent years, portfolio approaches to solving SAT problems and CSPs have become increasingly common. There are also a number of different encodings for representing CSPs as SAT instances. In this paper, we leverage advances in both SAT and CSP solving
B.A. Huberman   +11 more
core   +1 more source

The Fractal Dimension of SAT Formulas [PDF]

open access: yes, 2013
Modern SAT solvers have experienced a remarkable progress on solving industrial instances. Most of the techniques have been developed after an intensive experimental testing process.
Ansótegui, C.   +3 more
core   +3 more sources

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy