The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Salt restriction, the method which was acknowledged by modern medical knowledge that could delay kidney disease progression, was advanced in ancient times. We found that salt restriction therapies were presented in many ancient literatures during our ancient literature mining work. We sorted out the ancient trace of salt restriction about edema in chronic kidney disease (CKD). From frequency of herbals,...
In this paper, we propose a new secret sharing method for Chinese characters based on non-negative matrix factorization (NMF). Chinese characters can be regarded as binary images, but traditional NMF is only suitable for gray-level images. Therefore, this paper proposes a modified version of NMF for dealing with Chinese characters in binary images. The modified NMF decomposes a Chinese character into...
In this paper, we analyzed near-threshold-voltage (NTV) CMOS circuits with various body bias and proposed an NTV adder design with dual body bias. By adopting different body bias in the same time, adder delay and leakage power can be reduced. Also, the critical path is optimized to achieve better energy efficiency. The performance analysis are all performed under TSMC 90nm CMOS process with Monte...
In this paper, we perform the comparison study of ECG signals for subjects at distinct ends of cardiopulmonary fitness. The cardiopulmonary signals were acquired under rest condition, three graded exercise intensities, and recovery periods. The participants were recruited from university freshmen with cardiopulmonary fitness norm in top, middle, and bottom groups. Spectral analysis was performed to...
As technology improving, technological equipment can now be used to interact during entertainment activities. In this study, a semantic differential scale was used to investigate the feelings of viewers about combinations of shapes and colors, and refer it to produce interactive digital art work. Moreover, an electroencephalogram device was employed to measure the EEG signals of the viewers during...
The present study explored the effects of students' prior knowledge of science and online collaborative approaches on their science argumentation learning. Two science teachers and 102 students from four 8th grade science classes were invited to in our study. Students in each class were divided into three groups according to their prior knowledge level on science, they then took either our collaborative...
This paper studies the consistency of the extended Kalman filter(EKF) for a general class of nonlinear systems. Based on the EKF algorithm, we propose the CEKF as well as the tuning law for its parameters. The consistency of CEKF is proved. Finally, the feasibility and consistency are illustrated by the numerical simulation for an example system.
One of the most important information in outdoor emergency rescue is the location of the trapped people. The more quickly and precisely the location can be determined, the more chance the victims can be saved. In this paper, an instantly deployable localization system is proposed, which takes the mobile phone carried by the trapped people as the localization carrier, and consists of several Portable...
This paper proposed a formalize method of mandatory access control (MAC) model for multilevel secure DBMS and discussed the problems of labeling object in tuples, and security label, and covert channels. Mandatory access control (MAC) model requires that all users and resources are classified and assigned a security label, which is a combination of a hierarchical security level and non-hierarchical...
Radio Frequency Identification, RFID technology having been realized of its potential usages only in recent years is now widely used in multiple disciplinary industries and applications. Major of which include SCM, logistics and retail as well as manufacturing. Another key application area of RFID is its use for localisation or positioning of items and people indoors. However, signal propagation in...
Starting with the FCCpsilas first report & order in 2002, more and more research and development works about the applications of UWB technology have been carried out. The FCC constraints on the spectrum of the EIRP density of the pulses applied in UWB applications include the average and peak emission limits. This paper presents the investigation on the spectral mask of the FCC compliant UWB pulses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.