Results 71 to 80 of about 326,204 (277)
In this paper, we study the resource allocation problem, including the joint consideration of user grouping and power allocation, of an, underlay cognitive radio (CR) network employing non-orthogonal multiple access (NOMA), which is referred to as the ...
Wei Liang +4 more
doaj +1 more source
Merge or Not? Learning to Group Faces via Imitation Learning
Given a large number of unlabeled face images, face grouping aims at clustering the images into individual identities present in the data. This task remains a challenging problem despite the remarkable capability of deep learning approaches in learning ...
Cao, Kaidi +3 more
core +1 more source
User Partitioning for Less Overhead in MIMO Interference Channels
This paper presents a study on multiple-antenna interference channels, accounting for general overhead as a function of the number of users and antennas in the network.
Heath Jr, Robert W., Peters, Steven W.
core +1 more source
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd +3 more
wiley +1 more source
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez +13 more
wiley +1 more source
Performance Enhancement Using Receive Diversity With Power Adaptation in the NOMA System
This paper proposes receive diversity with power adaptation for a non-orthogonal multiple access (NOMA) system in a multi-user circumstance. Since the basic concept of power domain NOMA divides user data by the difference of power, successive ...
Ji-Hwan Kim +2 more
doaj +1 more source
\u3cem\u3eHP-DAEMON\u3c/em\u3e: \u3cem\u3eH\u3c/em\u3eigh \u3cem\u3eP\u3c/em\u3eerformance \u3cem\u3eD\u3c/em\u3eistributed \u3cem\u3eA\u3c/em\u3edaptive \u3cem\u3eE\u3c/em\u3energy-efficient \u3cem\u3eM\u3c/em\u3eatrix-multiplicati\u3cem\u3eON\u3c/em\u3e [PDF]
The demands of improving energy efficiency for high performance scientific applications arise crucially nowadays. Software-controlled hardware solutions directed by Dynamic Voltage and Frequency Scaling (DVFS) have shown their effectiveness extensively ...
Chen, Longxiang +5 more
core +1 more source
Layered Steered Space–Time-Spreading-Aided Generalized MC DS-CDMA
—We present a novel trifunctional multiple-input– multiple-output (MIMO) scheme that intrinsically amalgamates space–time spreading (STS) to achieve a diversity gain and a Vertical Bell Labs layered space–time (V-BLAST) scheme to attain a multiplexing ...
Alamri, Osamah +3 more
core +1 more source
Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack +12 more
wiley +1 more source
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing ...
Yinghui ZHANG +3 more
doaj

