Results 81 to 90 of about 202,881 (332)

Fault and Error Tolerance in Neural Networks: A Review

open access: yesIEEE Access, 2017
Beyond energy, the growing number of defects in physical substrates is becoming another major constraint that affects the design of computing devices and systems.
Cesar Torres-Huitzil, Bernard Girau
doaj   +1 more source

Computational complexity of network vulnerability analysis

open access: yesActa Universitatis Sapientiae, Informatica, 2022
Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time.
openaire   +3 more sources

The Impact of Tilburg Frailty on Poststroke Fatigue in First‐Ever Stroke Patients: A Cross‐Sectional Study With Unified Measurement Tools and Improved Statistics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen   +6 more
wiley   +1 more source

Systemic T Cell Receptor Profiling Reveals Adaptive Immune Activation and Potential Immune Signatures of Diagnosis and Brain Atrophy in Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin   +12 more
wiley   +1 more source

IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2019
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater ...
Scholastica Mallo, Francisca Ogwueleka
doaj  

DETEKSI KONDISI KETAHANAN PANGAN BERAS MENGGUNAKAN PEMODELAN SPASIAL KERENTANAN PANGAN

open access: yesJournal of Natural Resources and Environmental Management, 2012
In 2005 and 2009, BKP and WFP has provided food security conditions in Indonesia on Food Insecurity Map which were developed using food availability, food accessibility, food absorption and food vulnerability.
Dede Dirgahayu   +4 more
doaj   +1 more source

CSF Levels of NPTX2 Are Associated With Less Brain Atrophy Over Time in Cognitively Unimpaired Individuals

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Neuronal pentraxin 2 (NPTX2) is a synaptic protein involved in synaptic plasticity and regulation of neuronal excitability. Lower baseline cerebrospinal fluid (CSF) NPTX2 levels have been shown to be associated with an earlier onset of mild cognitive impairment (MCI), a pre‐dementia syndrome, even after CSF Alzheimer's Disease (AD)
Juan P. Vazquez   +12 more
wiley   +1 more source

CONCEPTUAL FRAMEWORK OF ANALYSIS OF INFORMATION SECURITY MODELS OF CLOUD SYSTEMS OF THE CLASS «INFRASTRUCTURE AS A SERVICE»

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
A process based on the role approach for the synthesis of information security models of cloud computing systems based on applied system and threat models is described; the result is a security model, expressed, for example, in recommendations for ...
E. V. Olizarovich, A. I. Brazhuk
doaj   +1 more source

Evaluating application vulnerability to soft errors in multi-level cache hierarchy [PDF]

open access: yes, 2011
As the capacity of cache increases dramatically with new processors, soft errors originating in cache has become a major reliability concern for high performance processors.
Carlson, Trevor   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy