Results 71 to 80 of about 193,514 (294)

A Systematic Review of Ship Wake Detection Methods in Satellite Imagery

open access: yesRemote Sensing
The field of maritime surveillance is one of great strategical importance from the point of view of both civil and military applications. The growing availability of spaceborne imagery makes it a great tool for ship detection, especially when paired with
Andrea Mazzeo   +2 more
doaj   +1 more source

Aircraft Wake Vortex Parameter-retrieval System Based on Lidar

open access: yesLeida xuebao, 2020
Aircraft wake are a couple of counter-rotating vortices generated by a flying aircraft, which can be very hazardous to a follower aircraft. The detection of it is regarded as a key issue for airport capacity improvement and air traffic safety management.
Chun SHEN   +3 more
doaj   +1 more source

A sub-mW IoT-endnode for always-on visual monitoring and smart triggering

open access: yes, 2017
This work presents a fully-programmable Internet of Things (IoT) visual sensing node that targets sub-mW power consumption in always-on monitoring scenarios.
Benini, Luca   +3 more
core   +1 more source

Accelerated Progression of Gait Impairment in Parkinson's Disease and REM Sleep Without Atonia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with Parkinson's disease (PD) and rapid eye movement (REM) sleep without atonia (RSWA) often have more severe gait disturbances compared to PD without RSWA. The association between the presence and expression of RSWA and the rate of progression of gait impairment in PD is unknown.
Sommer L. Amundsen‐Huffmaster   +11 more
wiley   +1 more source

Constraining the ages of the fireballs in the wake of the dIrr galaxy VCC1217 / IC3418

open access: yes, 2010
A complex of Halpha emitting blobs with strong FUV excess is associated to the dIrr galaxy VCC1217 / IC3418 (Hester et al. 2010), and extends up to 17 Kpc in the South-East direction. These outstanding features can be morphologically divided into diffuse
Bekki   +41 more
core   +1 more source

Copy Number Variants and Their Association With Intracerebral Hemorrhage Risk: A Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Intracerebral Hemorrhage (ICH) is a leading cause of morbidity and mortality worldwide and lacks effective therapeutic interventions. Despite previous studies, the genetic underpinnings of ICH remain poorly understood. We sought to investigate the role of copy number variants (CNVs) in ICH pathophysiology to identify novel ...
Savvina Prapiadou   +12 more
wiley   +1 more source

Ultralow Quiescent Power‐Consumption Wake‐Up Technology Based on the Bionic Triboelectric Nanogenerator

open access: yesAdvanced Science, 2020
Wake‐up circuits in smart microsystems make huge contributions to energy conservation of electronic networks in unmanned areas, which still require higher pressure‐triggering sensitivity and lower power consumption.
Chenxi Zhang   +6 more
doaj   +1 more source

Basilar Artery Occlusion Stroke Managed With Tenecteplase Versus Alteplase Before Endovascular Treatment (BAO‐TNK)

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To compare the effectiveness and safety of tenecteplase (TNK) versus alteplase (TPA) in patients with basilar artery occlusion prior to endovascular treatment (EVT). Methods In this retrospective multicenter study (BAO‐TNK), we analyzed consecutive BAO patients from 14 U.S.
Rahul R. Karamchandani   +38 more
wiley   +1 more source

Multi-model Fusion Speech Wake-up Word Detection Method Based on Ghost-SE-Res2Net [PDF]

open access: yesJisuanji gongcheng
Speech Wake-up Word Detection(WWD)is a key technology in the field of voice interaction. Choosing an appropriate detection window size significantly affects the performance of WWD. This study proposes a novel multi-model fusion method.
Qiuchen YU, Ruohua ZHOU, Qingsheng YUAN
doaj   +1 more source

Sleep Deprivation Attack Detection in Wireless Sensor Network

open access: yes, 2012
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes.
Bhattasali, Tapalina   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy