Search

Results: 389
Experimental Study of Location Spoofing and Identity Spoofing Attack in Internet of Things Network
IoT devices are placed at open places, generally at where monitoring and controlling of devices from remote location is difficult. Location spoofing is a threat in which an intruder intentionally modifies the contextual...
Grey Matter Etymology and the neuron(e).
‘Neuron’ or ‘neurone’? While it is often assumed that these different spellings reflect usage of American versus British English, there are also inconsistencies within these cultural boundaries. Mehta et al. review historical...
An Outlook Architecture
The internet of things (IoT) has recently received much attention due to its revolutionary potential. The internet of things facilitates data interchange in a large number of possible applications, including smart...
Adaptive sample size modification in clinical trials
We consider sample size re-estimation in a clinical trial, in particular when there is a significant delay before the measurement of patient response. Mehta and Pocock have proposed methods in which sample size is increased when...
Adaptive sample size modification in clinical trials
We consider sample size re-estimation in a clinical trial, in particular when there is a significant delay before the measurement of patient response. Mehta and Pocock have proposed methods in which sample size is increased when...
Arrhythmia Classification Using Radial Basis Function Network With Selective Features From Empirical Mode Decomposition
In this piece of work, the authors have attempted to classify four types of long duration arrhythmia electrocardiograms (ECG) using radial basis function network (RBFN). The data is taken from Massachusetts Institute of...
Adaptive Parameter Estimation of IIR System-Based WSN Using Multihop Diffusion in Distributed Approach
Distributed estimation of parameters in wireless sensor networks is taken into consideration to reduce the communication overhead of the network which makes the sensor system energy efficient. Most of the distributed approaches...
Loss surface of XOR artificial neural networks.
Training an artificial neural network involves an optimization process over the landscape defined by the cost (loss) as a function of the network parameters. We explore these landscapes using optimization tools developed for...
Online information on face masks
OBJECTIVE: Countries have major differences in the acceptance of face mask use for the prevention of COVID-19. This work aims at studying the information online in different countries in terms of information quality and content....
Cooperative Behavior in the Ultimatum Game and Prisoner's Dilemma Depends on Players' Contributions.
Economic games such as the Ultimatum Game (UG) and Prisoner's Dilemma (PD) are widely used paradigms for studying fairness and cooperation. Monetary versions of these games involve two players splitting an arbitrary sum of...
Sentiment Weighted Word Embedding for Big Text Data
Sentiment analysis is the practice of eliciting a sentiment orientation of people's opinions (i.e. positive, negative and neutral) toward the specific entity. Word embedding technique like Word2vec is an effective approach to...
Neuromuscular blocking characteristics of rocuronium bromide mixed with sodium bicarbonate
Intravenous rocuronium produces intense discomfort at the site of injection hence leading to limb movements. Strategies to reduce or prevent pain on injection, along with the effect of adjuvant on the onset and duration of...
Published by: IJHS Medical Association

|<

<

1

2

3

4

5

>

>|