Статті в журналах з теми "Invoked device"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Invoked device.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Invoked device".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Li, Peng, Chenchen Shu, and Jiao Feng. "A Reciprocal-Selection-Based ‘Win–Win’ Overlay Spectrum-Sharing Scheme for Device-to-Device-Enabled Cellular Network." Algorithms 11, no. 11 (November 6, 2018): 179. http://dx.doi.org/10.3390/a11110179.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper proposes a reciprocal-selection-based ‘Win–Win’ overlay spectrum-sharing scheme for device-to-Device-enabled cellular networks to address the resource sharing between Device-to-Device devices and the cellular users by using an overlay approach. Based on the proposed scheme, the cell edge users intend to lease part of its spectrum resource to Device-to-Device transmission pairs. However, the Device-to-Device users have to provide the cooperative transmission assistance for the cell edge users in order to improve the Quality of Service of the uplink transmission from the cell edge users to the base station. Compared to the underlay spectrum-sharing scheme, overlay spectrum-sharing scheme may reduce spectrum efficiency. Hence, Non-Orthogonal Multiple Access technology is invoked at the Device-to-Device transmitter in order to improve the spectrum efficiency. The Stackelberg game is exploited to model the behaviours of the cell edge users and Device-to-Device devices. Moreover, based on matching theory, the cell edge users and Device-to-Device pairs form one-to-one matching and the stability of matching is analysed. The simulation results show that the proposed reciprocal-selection-based ‘Win–Win’ overlay spectrum-sharing scheme is capable of providing considerable rate improvements for both EUs and D2D pairs and reducing transmit power dissipated by the D2D transmitter to forward data for the EU compared with the existing methods.
2

Marek, Juraj, Jozef Kozarik, Michal Minarik, Aleš Chvála, Matej Matus, Martin Donoval, Lubica Stuchlikova, and Martin Weis. "Charge Trap States of SiC Power TrenchMOS Transistor under Repetitive Unclamped Inductive Switching Stress." Materials 15, no. 22 (November 19, 2022): 8230. http://dx.doi.org/10.3390/ma15228230.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Silicon carbide (SiC) has been envisioned as an almost ideal material for power electronic devices; however, device reliability is still a great challenge. Here we investigate the reliability of commercial 1.2-kV 4H-SiC MOSFETs under repetitive unclamped inductive switching (UIS). The stress invoked degradation of the device characteristics, including the output and transfer characteristics, drain leakage current, and capacitance characteristics. Besides the shift of steady-state electrical characteristics, a significant change in switching times points out the charge trapping phenomenon. Transient capacitance spectroscopy was applied to investigate charge traps in the virgin device as well as after UIS stress. The intrinsic traps due to metal impurities or Z1,2 transitions were recognized in the virgin device. The UIS stress caused suppression of the second stage of the Z1,2 transition, and only the first stage, Z10, was observed. Hence, the UIS stress is causing the reduction of multiple charging of carbon vacancies in SiC-based devices.
3

Grünbaum, Tobias, Sebastian Milster, Hermann Kraus, Wolfram Ratzke, Simon Kurrmann, Viola Zeller, Sebastian Bange, Christoph Boehme, and John M. Lupton. "OLEDs as models for bird magnetoception: detecting electron spin resonance in geomagnetic fields." Faraday Discussions 221 (2020): 92–109. http://dx.doi.org/10.1039/c9fd00047j.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Воскобойников, Михаил Леонтьевич, Роман Константинович Федоров, and Геннадий Михайлович Ружников. "Automatic definition of web service call zones based on the classification of context of the mobile device." Вычислительные технологии, no. 2 (June 22, 2021): 88–97. http://dx.doi.org/10.25743/ict.2021.26.2.007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Предложен метод автоматизации активации устройств Интернета вещей на основе классификации геопозиции мобильного устройства. В отличие от других методов пользователь обучает систему активации устройств с помощью примеров и контрпримеров, что значительно снижает требования к квалификации пользователя. Проведено тестирование метода на таких двух устройствах, как шлагбаум и электромеханический замок двери. Полученные результаты тестирования позволяют судить о работоспособности метода и возможности его использования в системах умного дома и города. Most IoT devices provide an application programming interface such as web service that allows controlling these IoT devices over Internet using a mobile phone. Activation of IoT devices is performed according to the status of user behavior. Both user behavior and activation of IoT devices are periodical. An activation of IoT device is often related with a user geolocation which can be defined by sensors of the mobile device. A method for automated activation of IoT devices based on classification of geolocation of mobile device is proposed. The method implements a supervised learning that simplifies automate activation of IoT devices for the end users. Existing methods demand appropriate end user qualification and require long time to automate activation. For indoor geolocation of the mobile device information from Wi-Fi access points and geolocation GPS sensor is utilized. Data of Wi-Fi and GPS sensors is used to form context of a mobile device. Based on context examples of invoking/not invoking web services the spatial areas are formed. When the mobile device context is within the web service invocation area, the web service is invoked and the associated IoT device is activated. To implement the method, an Android application was developed. The method was tested on a training set that contained 100 training examples of calling two web services: opening an electromechanical door lock and opening a barrier. As a result of testing, the accuracy of classifying the context of a mobile device was 98 percent. The results obtained can be used in the development of smart home and smart city systems.
5

Trudeau, Charles, Martin Bolduc, Patrick Beaupré, Patrice Topart, Christine Alain, and Sylvain Cloutier. "Inkjet-Printed Flexible Active Multilayered Structures." MRS Advances 2, no. 18 (2017): 1015–20. http://dx.doi.org/10.1557/adv.2017.237.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACTActive inkjet materials are invoked in the fabrication of optoelectronic devices. These types of multilayer assemblies contain a variety of commercially available ink formulations. It is envisioned that a dielectric SU-8 material can be used in a FET-like structure to form an interlayer between conductive silver and semi-conductive MWCNT-doped PEDOT:PSS ink layers. These printed structures may be fabricated onto a polyimide based flexible substrate, for instance. These structures are a starting point for offering valuable information on layer-on-layer printing interactions and interface problematics within a complete inkjet device fabrication.
6

Mishra, Arunendra Kumar, and Dr Raghvendra Singh. "Comparative Analysis of RCC Structure with Energy Dissipation Device and Composite Structure." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 1323–33. http://dx.doi.org/10.22214/ijraset.2022.48203.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract: The ground movement which occurred naturally and creates disaster to cause damage of the structures is called Earthquake. In the earth’s crust seismic activities occur that creates waves. These waves transmit to structures through foundation. Thus, due to this earthquake movements, inertia force is invoked in structure resulting in damaging the whole or part of structure. Base isolation is the recent development for seismic resistant designs, this may not be totally controlling the ground movement but helps in minimising the impact of ground movement. Base isolation enables in reduction of earthquake forces by lengthening the period of vibration of structure. Also, the structural response accelerations are less than the ground acceleration because of Base isolation.
7

Khatter, Kiran, and Sapna Malik. "Ranking and Risk Factor Scheme for Malicious applications detection and Classifications." International Journal of Information System Modeling and Design 9, no. 3 (July 2018): 67–84. http://dx.doi.org/10.4018/ijismd.2018070104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Being an open source operating system, android mobiles are attacked by hundreds of malware every year. Moreover, malware are using many veiled techniques that makes it difficult to detect them. Android official markets and the Google Play Store are also not left untouched by malware. This article presents the Ranking and Risk Factor Scheme (RRFS), a hybrid intrusion detection technique for Android devices for the detection of malicious android applications. Ranking and risk factor schemes perform an analysis of Android permissions requested and system calls invoked features by ranking these features with some criteria and calculating the risk factor of each application for the detection and classification of malicious applications of 81 malware families. In the results, the ranking and risk factor scheme outperforms several related approaches and has the detection and classification performance of 99.2% and 88.7%, respectively and proved fast, an energy-efficient technique for resource constraint mobile device
8

Harper, Richard, Sean Rintel, Rod Watson, and Kenton O’Hara. "The ‘interrogative gaze’." Pragmatics. Quarterly Publication of the International Pragmatics Association (IPrA) 27, no. 3 (October 2, 2017): 319–50. http://dx.doi.org/10.1075/prag.27.3.02har.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract This paper identifies salient properties of how talk about video communication is organised interactionally, and how this interaction invokes an implied order of behaviour that is treated as ‘typical’ and ‘accountably representative’ of video communication. This invoked order will be called an interrogative gaze. This is an implied orientation to action, one that is used as a jointly managed interpretative schema that allows video communication to be talked about and understood as rationally, purposively and collaboratively undertaken in particular, ‘known in common’ ways. This applies irrespective of whether the actions in question are prospective (are about to happen) or have been undertaken in the past and are being accounted for in the present or are ‘generally the case’ – in current talk. The paper shows how this constitutive device also aids in sense making through such things as topic management in video-mediated interaction, and in elaborating the salience of the relationship between this and the patterned governance of social affairs – viz, mother-daughter, friend-friend – as normatively achieved outcomes. It will be shown how the interrogative gaze is variously appropriate and consequentially invoked not just in terms of what is done in a video call or making such calls accountable, but in helping articulate different orders of connection between persons, and how these orders have implications for sensible and appropriate behaviour in video calling and hence, for the type of persons who are involved. This, in turn, explains how a decision to avoid using video communication is made an accountably reasonable thing to do. The relevance of these findings for the sociology of everyday life and the philosophy of action are explored.
9

Kim, Eun-jin, and Massimo Capoccia. "Synergistic Model of Cardiac Function with a Heart Assist Device." Bioengineering 7, no. 1 (December 19, 2019): 1. http://dx.doi.org/10.3390/bioengineering7010001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The breakdown of cardiac self-organization leads to heart diseases and failure, the number one cause of death worldwide. The left ventricular pressure–volume relation plays a key role in the diagnosis and treatment of heart diseases. Lumped-parameter models combined with pressure–volume loop analysis are very effective in simulating clinical scenarios with a view to treatment optimization and outcome prediction. Unfortunately, often invoked in this analysis is the traditional, time-varying elastance concept, in which the ratio of the ventricular pressure to its volume is prescribed by a periodic function of time, instead of being calculated consistently according to the change in feedback mechanisms (e.g., the lack or breakdown of self-organization) in heart diseases. Therefore, the application of the time-varying elastance for the analysis of left ventricular assist device (LVAD)–heart interactions has been questioned. We propose a paradigm shift from the time-varying elastance concept to a synergistic model of cardiac function by integrating the mechanical, electric, and chemical activity on microscale sarcomere and macroscale heart levels and investigating the effect of an axial rotary pump on a failing heart. We show that our synergistic model works better than the time-varying elastance model in reproducing LVAD–heart interactions with sufficient accuracy to describe the left ventricular pressure–volume relation.
10

Damkliang, Kasikrit, Jarutas Andritsch, Krittamate Khamkom, and Nanida Thongthep. "A System for Sleepwalking Accident Prevention Utilizing the Remote Sensor of Wearable Device." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 13, no. 2 (March 14, 2020): 160–69. http://dx.doi.org/10.37936/ecti-cit.2019132.184442.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Sleepwalking is a type of sleep disorder which originates during deep sleep and results in walking state and performing series of complex behaviors or actions while sleeping. In some cases, sleepwalking patients can injure themselves from their actions such as driving a car or climbing out of a window. In addition, to wake up the sleepwalkers can be difficult. The suddenly waking up and can cause them to be confused or even attack the person who wakes them. Therefore, detecting the sleepwalking incident in an early state can help the caretaker or family members to stop the patients before they harm themselves from any strange, inappropriate, or violent behaviors. In this research, we present a prototype system of sleepwalking detection algorithm and notification system using smart device which work coordinating with wearable device. There are two main groups of users; patients and caretakers. User Activity Sensor (UAS) in the wearable device is utilized for detecting User Activity Data (UAD) which is unusual activities of inducing a sleepwalking patient provided by the Remote Sensor SDK. The system returns the patient UAD states consisting of standing, walking, and running. The smart device accepts the UAD states from the wearable device, performs sleepwalking detection algorithms then, alarms caretakers when the sleepwalking state has already invoked. The system is implemented, built, tested and deployed. The threefold experimental measurement of physical user activites have been performed to validate our proposed sleepwalking detection algorithms. The system correctly detects the sleepwalking states and notifies the caretaker.
11

Demontis, Valeria, Valentina Zannier, Lucia Sorba, and Francesco Rossella. "Surface Nano-Patterning for the Bottom-Up Growth of III-V Semiconductor Nanowire Ordered Arrays." Nanomaterials 11, no. 8 (August 16, 2021): 2079. http://dx.doi.org/10.3390/nano11082079.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ordered arrays of vertically aligned semiconductor nanowires are regarded as promising candidates for the realization of all-dielectric metamaterials, artificial electromagnetic materials, whose properties can be engineered to enable new functions and enhanced device performances with respect to naturally existing materials. In this review we account for the recent progresses in substrate nanopatterning methods, strategies and approaches that overall constitute the preliminary step towards the bottom-up growth of arrays of vertically aligned semiconductor nanowires with a controlled location, size and morphology of each nanowire. While we focus specifically on III-V semiconductor nanowires, several concepts, mechanisms and conclusions reported in the manuscript can be invoked and are valid also for different nanowire materials.
12

Margaritondo, Giorgio, and Johann Rafelski. "The relativistic foundations of synchrotron radiation." Journal of Synchrotron Radiation 24, no. 4 (June 20, 2017): 898–901. http://dx.doi.org/10.1107/s160057751700769x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Special relativity (SR) determines the properties of synchrotron radiation, but the corresponding mechanisms are frequently misunderstood. Time dilation is often invoked among the causes, whereas its role would violate the principles of SR. Here it is shown that the correct explanation of the synchrotron radiation properties is provided by a combination of the Doppler shift, not dependent on time dilation effects, contrary to a common belief, and of the Lorentz transformation into the particle reference frame of the electromagnetic field of the emission-inducing device, also with no contribution from time dilation. Concluding, the reader is reminded that much, if not all, of our argument has been available since the inception of SR, a research discipline of its own standing.
13

Erickson-Davis, Cordelia, and Helma Korzybska. "What do blind people “see” with retinal prostheses? Observations and qualitative reports of epiretinal implant users." PLOS ONE 16, no. 2 (February 10, 2021): e0229189. http://dx.doi.org/10.1371/journal.pone.0229189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Introduction Retinal implants have now been approved and commercially available for certain clinical populations for over 5 years, with hundreds of individuals implanted, scores of them closely followed in research trials. Despite these numbers, however, few data are available that would help us answer basic questions regarding the nature and outcomes of artificial vision: what do recipients see when the device is turned on for the first time, and how does that change over time? Methods Semi-structured interviews and observations were undertaken at two sites in France and the UK with 16 recipients who had received either the Argus II or IRIS II devices. Data were collected at various time points in the process that implant recipients went through in receiving and learning to use the device, including initial evaluation, implantation, initial activation and systems fitting, re-education and finally post-education. These data were supplemented with data from interviews conducted with vision rehabilitation specialists at the clinical sites and clinical researchers at the device manufacturers (Second Sight and Pixium Vision). Observational and interview data were transcribed, coded and analyzed using an approach guided by Interpretative Phenomenological Analysis (IPA). Results Implant recipients described the perceptual experience produced by their epiretinal implants as fundamentally, qualitatively different than natural vision. All used terms that invoked electrical stimuli to describe the appearance of their percepts, yet the characteristics used to describe the percepts varied significantly between recipients. Artificial vision for these recipients was a highly specific, learned skill-set that combined particular bodily techniques, associative learning and deductive reasoning in order to build a “lexicon of flashes”—a distinct perceptual vocabulary that they then used to decompose, recompose and interpret their surroundings. The percept did not transform over time; rather, the recipient became better at interpreting the signals they received, using cognitive techniques. The process of using the device never ceased to be cognitively fatiguing, and did not come without risk or cost to the recipient. In exchange, recipients received hope and purpose through participation, as well as a new kind of sensory signal that may not have afforded practical or functional use in daily life but, for some, provided a kind of “contemplative perception” that recipients tailored to individualized activities. Conclusion Attending to the qualitative reports of implant recipients regarding the experience of artificial vision provides valuable information not captured by extant clinical outcome measures.
14

Wada, N., K. Kuwada, J. S. Kim, M. Takeguchi, and M. Takeda. "Precipitation Behavior and Magnetic Properties of Cu-Fe-Co Alloys Containing Nanogranular Ferromagnetic-Element Particles." Advances in Condensed Matter Physics 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/865695.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This work investigates the evolution of microstructures and magnetic properties during isothermal annealing of Cu-Fe-Co alloys, using electron microscopy and superconducting quantum interference device (SQUID) magnetometry. Small coherent granular precipitates composed of iron and cobalt formed in the copper matrix in the early stage of precipitation. As annealing proceeded, the precipitates lost coherency to the matrix after reaching a size of 15–20 nm and twin-like structures were consecutively introduced in the particles. The SQUID measurements revealed that the magnetic properties of the specimens correlated with the microstructural evolution. The coercive force initially increased with annealing time but decreased after reaching a peak. Lorentz Microscopy suggested that the initial large increase of magnetization was invoked by a structural transition from fcc to B2 in the precipitates.
15

Thomas, Pradip Ninan. "Public Hearings and Public Spheres in India: The Case of the Right to Information (RTI) Movement." Media International Australia 152, no. 1 (August 2014): 133–42. http://dx.doi.org/10.1177/1329878x1415200114.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article explores issues related to the Right to Information movement in India specifically in relation to the public sphere, a concept that is habitually invoked to describe spaces for deliberation and communication. It explores the role played by the jan sunwai (public hearings) in the creation of a counter public sphere based on the local idiom, local means of communication and performative traditions that enabled a balance between speaking, listening and actioning. The article focuses on the Right to Information movement and the jan sunwai as an important indigenous means and pedagogical device used by this movement to mobilise, radicalise and give voice to marginalised people who have traditionally been expected to remain silent, even in the face of the most atrocious atrocities committed by the forward castes and wealthy.
16

Huensch, Amanda. "How the initiation and resolution of repair sequences act as a device for the co-construction of membership and identity." Pragmatics and Society 8, no. 3 (October 13, 2017): 355–76. http://dx.doi.org/10.1075/ps.8.3.02hue.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract This conversation analytic paper investigates how speakers self-position or are other-positioned as members of a certain social group (e.g., competent speakers of a language) through other-initiated repair. Findings illustrate the complexity of linguistic membership categories by demonstrating that they continually shift depending on local interactional goals and documenting how shifts are accomplished. The different levels and types of linguistic and cultural knowledge that are invoked in instances of repair on specific lexical items demonstrate the complexity of linguistic membership categorization, and this indicates a need to problematize the use of a priori and overly-vague labels like ‘non-native speaker’. Findings contribute to our understanding of the functions of other-initiated repair and the mechanisms of co-constructing membership (categorization) and thus social identity in interaction. They also raise questions about the relationship between amounts and types of knowledge and further our understanding of the construction of expert/novice categories via knowledge displays and negotiation.
17

Zhang, Bingda, Yang Wang, Sijia Tu, and Zhao Jin. "FPGA-Based Real-Time Digital Solver for Electro-Mechanical Transient Simulation." Energies 11, no. 10 (October 4, 2018): 2650. http://dx.doi.org/10.3390/en11102650.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A field-programmable gate array (FPGA)-based digital solver for real-time electromechanical transient simulation is designed in this paper. The solving process for a device or sub-network in an electromechanical transient simulation is packaged into the orders in soft function solvers. The orders are reused by soft function solvers that are invoked by microprocessor cores. The data exchange between the microprocessor cores and soft function solvers is enhanced through explicit and implicit channels. The orders of the microprocessor cores are stored in the synchronous dynamic random access memory on the FPGA board, which solves the problem of insufficient storage space for the orders in electromechanical transient simulation. A real-time digital solver for electromechanical transient simulation, whose feasibility is verified by a simulation of part of the power system in East China, is successfully constructed by applying a small number of microprocessor cores and multiple soft function solvers.
18

Bernardos, Ana M., Xian Wang, Luca Bergesio, Juan A. Besada, and José R. Casar. "Assessing the Acceptance of a Mid-Air Gesture Syntax for Smart Space Interaction: An Empirical Study." Journal of Sensor and Actuator Networks 13, no. 2 (April 9, 2024): 25. http://dx.doi.org/10.3390/jsan13020025.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Mid-gesture interfaces have become popular for specific scenarios, such as interactions with augmented reality via head-mounted displays, specific controls over smartphones, or gaming platforms. This article explores the use of a location-aware mid-air gesture-based command triplet syntax to interact with a smart space. The syntax, inspired by human language, is built as a vocative case with an imperative structure. In a sentence like “Light, please switch on!”, the object being activated is invoked via making a gesture that mimics its initial letter/acronym (vocative, coincident with the sentence’s elliptical subject). A geometrical or directional gesture then identifies the action (imperative verb) and may include an object feature or a second object with which to network (complement), which also represented by the initial or acronym letter. Technically, an interpreter relying on a trainable multidevice gesture recognition layer makes the pair/triplet syntax decoding possible. The recognition layer works on acceleration and position input signals from graspable (smartphone) and free-hand devices (smartwatch and external depth cameras), as well as a specific compiler. On a specific deployment at a Living Lab facility, the syntax has been instantiated via the use of a lexicon derived from English (with respect to the initial letters and acronyms). A within-subject analysis with twelve users has enabled the analysis of the syntax acceptance (in terms of usability, gesture agreement for actions over objects, and social acceptance) and technology preference of the gesture syntax within its three device implementations (graspable, wearable, and device-free ones). Participants express consensus regarding the simplicity of learning the syntax and its potential effectiveness in managing smart resources. Socially, participants favoured the Watch for outdoor activities and the Phone for home and work settings, underscoring the importance of social context in technology design. The Phone emerged as the preferred option for gesture recognition due to its efficiency and familiarity. The system, which can be adapted to different sensing technologies, addresses the scalability concerns (as it can be easily extended for new objects and actions) and allows for personalised interaction.
19

Acho, Leonardo. "A Nonlinear Magnetic Stabilization Control Design for an Externally Manipulated DC Motor: An Academic Low-Cost Experimental Platform." Machines 9, no. 5 (May 14, 2021): 101. http://dx.doi.org/10.3390/machines9050101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The main objective of this paper is to present a position control design to a DC-motor, where the set-point is externally supplied. The controller is conceived by using vibrational control theory and implemented by just processing the time derivative of a Hall-effect sensor signal. Vibrational control is robust against model uncertainties. Hence, for control design, a simple mathematical model of a DC-Motor is invoked. Then, this controller is realized by utilizing analog electronics via operational amplifiers. In the experimental set-up, one extreme of a flexible beam attached to the motor shaft, and with a permanent magnet fixed on the other end, is constructed. Therefore, the control action consists of externally manipulating the flexible beam rotational position by driving a moveable Hall-effect sensor that is located facing the magnet. The experimental platform results in a low-priced device and is useful for teaching control and electronic topics. Experimental results are evidenced to support the main paper contribution.
20

Strandvad, Sara Malou. "Organizing for the auteur: a dual case study of debut filmmaking." MedieKultur: Journal of media and communication research 28, no. 53 (August 21, 2012): 18. http://dx.doi.org/10.7146/mediekultur.v28i53.5523.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p>Abstract</p><p>In this article, the question of the auteur is transferred from film criticism to filmmaking processes in order to analyze how production practices are organized. By doing so, the article shifts the focus from understanding the concept of the auteur from a textual perspective to a sociological analysis, where the concept is understood as a social resource that enables and structures certain kinds of interactions. Accordingly, the article investigates how the ideal of the auteur is invoked in a dual case study of the making of two Danish debut films. In both projects, the directors embody the motif of the project and the auteur notion thereby comes to be activated as an organizing device. The analysis shows that putting the auteur notion to use to organize the making of films has various consequences, not all of which are intended and beneficial. </p>
21

Denny, Rita. "Marking the interaction order: The social consitution of turn exchange and speaking turns." Language in Society 14, no. 1 (March 1985): 41–62. http://dx.doi.org/10.1017/s0047404500010939.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACTThis paper is about turn exchanges, the structure of speaking turns and the relationship of nonverbal behavior to both exchanges and turns. Its purpose is to present a conceptual framework for analyzing and interpreting turn exchange and speaking turns, and data are cited when possible. First discussed are specific forms of exchange such as “smooth” and “simultaneous.” The Praguean concept of functional differentiation is invoked to argue that forms of turn exchange have indexical value. The relationship of nonverbal behavior to turn exchange is then discussed. An analysis of videotaped, dyadic interactions between strangers, “getting acquainted” conversation, is reported in order to demonstrate that the nonoverlapping exchange has structurally, hence indexically. distinct forms. These forms, defined by both verbal and nonverbal elements, are ordered in a hierarchy of pragmatic markedness. It is concluded that differentiating pragmatic markedness in conversational patterns is a powerful device for determining indexical features of conversation and thus of relevance for a semiotic understanding of everyday speech.
22

Hart, Christopher. "‘Riots engulfed the city’: An experimental study investigating the legitimating effects of fire metaphors in discourses of disorder." Discourse & Society 29, no. 3 (November 9, 2017): 279–98. http://dx.doi.org/10.1177/0957926517734663.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In Cognitive Linguistic Critical Discourse Studies (CL-CDS), metaphor is identified as a key index of ideology and an important device in the legitimation of social action. From this perspective metaphor is a cognitive-semiotic operation, invoked by metaphorical expressions in discourse, in which a source frame is mobilised to provide a template for sense-making inside a target frame, leading to particular framing effects. However, the extent to which metaphors in discourse genuinely activate an alternative frame and thereby achieve framing effects has recently been subject to question. Amid calls for more empirical forms of analysis in CDS, the article reports two experiments testing the legitimating framing effects of fire metaphors in discourses of disorder. Results show that images of fire and fire metaphors in the absence of competing images facilitate support for police use of water cannon in response to social unrest. The study not only justifies attention to metaphor in CL-CDS, but similar effects observed across semiotic modalities are interpreted as evidence in support of simulation-based theories of metaphor.
23

Jiang, Congfeng, Tiantian Fan, Yeliang Qiu, Hongyuan Wu, Jilin Zhang, Neal Xiong, and Jian Wan. "Interdomain I/O Optimization in Virtualized Sensor Networks." Sensors 18, no. 12 (December 12, 2018): 4395. http://dx.doi.org/10.3390/s18124395.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In virtualized sensor networks, virtual machines (VMs) share the same hardware for sensing service consolidation and saving power. For those VMs that reside in the same hardware, frequent interdomain data transfers are invoked for data analytics, and sensor collaboration and actuation. Traditional ways of interdomain communications are based on virtual network interfaces of bilateral VMs for data sending and receiving. Since these network communications use TCP/IP (Transmission Control Protocol/Internet Protocol) stacks, they result in lengthy communication paths and frequent kernel interactions, which deteriorate the I/O (Input/Output) performance of involved VMs. In this paper, we propose an optimized interdomain communication approach based on shared memory to improve the interdomain communication performance of multiple VMs residing in the same sensor hardware. In our approach, the sending data are shared in memory pages maintained by the hypervisor, and the data are not transferred through the virtual network interface via a TCP/IP stack. To avoid security trapping, the shared data are mapped in the user space of each VM involved in the communication, therefore reducing tedious system calls and frequent kernel context switches. In implementation, the shared memory is created by a customized shared-device kernel module that has bidirectional event channels between both communicating VMs. For performance optimization, we use state flags in a circular buffer to reduce wait-and-notify operations and system calls during communications. Experimental results show that our proposed approach can provide five times higher throughput and 2.5 times less latency than traditional TCP/IP communication via a virtual network interface.
24

Skvortsov, Alex, and Branko Ristic. "Modelling and Performance Analysis of a Network of Chemical Sensors with Dynamic Collaboration." International Journal of Distributed Sensor Networks 8, no. 1 (November 24, 2011): 656231. http://dx.doi.org/10.1155/2012/656231.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The problem of environmental monitoring using a wireless network of chemical sensors with a limited energy supply is considered. Since the conventional chemical sensors in active mode consume vast amounts of energy, an optimisation problem arises in the context of a balance between the energy consumption and the detection capabilities of such a network. A protocol based on “dynamic sensor collaboration” is employed: in the absence of any pollutant, the majority of sensors are in the sleep (passive) mode; a sensor is invoked (activated) by wake-up messages from its neighbors only when more information is required. The paper proposes a mathematical model of a network of chemical sensors using this protocol. The model provides valuable insights into the network behavior and near optimal capacity design (energy consumption against detection). An analytical model of the environment, using turbulent mixing to capture chaotic fluctuations, intermittency, and nonhomogeneity of the pollutant distribution, is employed in the study. A binary model of a chemical sensor is assumed (a device with threshold detection). The outcome of the study is a set of simple analytical tools for sensor network design, optimisation, and performance analysis.
25

Cawood, John. "Technology as text: the changing meanings of the fixed and mobile telephone." Comunicação e Sociedade 8 (December 20, 2005): 229–40. http://dx.doi.org/10.17231/comsoc.8(2005).1194.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recent sociological studies of the mobile phone and the fixed line telephone have drawn attention to the changing meanings of communications technologies. Whilst manufacturers often represent “preferred” uses in product marketing, users frequently subvert such intended purposes, modify them or invent new practices. Mobile phones, whose “essential” function was verbal communication, were initially designed and marketed for business and professional use. Today we use them to chat and keep in touch with our children. Their basic function of speech communication has been subverted as teenagers opt to for text messages. School-children have invented new social uses despite the efforts of mobile phone companies to persuade them otherwise.Traditionally, social scientists have assumed that a device such as the telephone has an intrinsic purpose determined by some essential property of its technology. Such an approach stands in contrast to the analysis of works of art or products of the media where factors such as religious belief, social values and political ideology are routinely invoked to explain their various interpretations. This paper suggests that such a dichotomy is false. Concepts from cultural studies and communications theory are used to argue that technologies such as the telephone are cultural products with symbolic as well as economic value and that users can shift their meanings.
26

BUSE, CHRISTINA, and JULIA TWIGG. "Materialising memories: exploring the stories of people with dementia through dress." Ageing and Society 36, no. 06 (May 11, 2015): 1115–35. http://dx.doi.org/10.1017/s0144686x15000185.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACTIn this article, we use clothes as a tool for exploring the life stories and narratives of people with dementia, eliciting memories through the sensory and material dimensions of dress. The article draws on an Economic and Social Research Council-funded study, ‘Dementia and Dress’, which explored everyday experiences of clothing for carers, care workers and people with dementia, using qualitative and ethnographic methods including: ‘wardrobe interviews’, observations, and visual and sensory approaches. In our analysis, we use three dimensions of dress as a device for exploring the experiences of people with dementia:kept clothes, as a way of retaining connections to memories and identity;discarded clothes, and their implications for understanding change and loss in relation to the ‘dementia journey’; andabsent clothes, invoked through the sensory imagination, recalling images of former selves, and carrying identity forward into the context of care. The article contributes to understandings of narrative, identity and dementia, drawing attention to the potential of material objects for evoking narratives, and maintaining biographical continuity for both men and women. The paper has larger implications for understandings of ageing and care practice; as well as contributing to the wider Material Turn in gerontology, showing how cultural analyses can be applied even to frail older groups who are often excluded from such approaches.
27

SUÑE, JORDI, DAVID JIMENEZ, and ENRIQUE MIRANDA. "BREAKDOWN MODES AND BREAKDOWN STATISTICS OF ULTRATHIN SiO2 GATE OXIDES." International Journal of High Speed Electronics and Systems 11, no. 03 (September 2001): 789–848. http://dx.doi.org/10.1142/s0129156401001003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The dielectric breakdown of ultra-thin silicon dioxide films used as gate insulator in MOSFETs is one of the most important reliability issues in CMOS technology. In this paper, two main aspects of oxide breakdown are considered: the modeling of the breakdown statistics and the properties of the two main breakdown modes, namely Soft Breakdown and Hard Breakdown. The most invoked models for the breakdown statistics that relate defect generation and breakdown are reviewed. Particular attention is paid to the percolation models and to a recent cell-based analytic picture. The scaling of the breakdown distribution with oxide thickness is considered and it is shown that both pictures are equivalent for ultra-thin oxides. It is shown that soft and hard breakdown show coincident statistics and this is used to conclude that both breakdown models are triggered by the formation of the same kind of defect-related conduction paths. The big differences in the post-breakdown conduction properties are attributed to phenomena occurring during the very fast breakdown current runaway that determine the area of the final breakdown spot. The properties of soft and hard breakdown are explained within the common framework of a model based on quantum-point-contact conduction. This mesoscopic approach to the post-breakdown conduction is shown to explain the main experimental results including conductance quantization after hard breakdown, the area and thickness independence of the soft-breakdown I(V) characteristics and the statistical correlation between current level and normalized conductance. Finally, we deal with some open questions and relevant issues that are now subject of intensive investigations. The fact that some breakdown events can be tolerated for some digital applications is considered. In this regard, the distinction between breakdown and device failure distributions is made and some implications for device reliability are discussed. It is argued that energy dissipation during the breakdown runaway can determine the breakdown efficiency, the prevalence ratio of soft to hard breakdown, and their variations with stress conditions, experimental setup (series impedance) and sample characteristics.
28

Hu, Dong, Xintian Hao, and Chao Liu. "Application Research of Wireless Sensor Network Based on Computer BIM Technology and ZigBee in Interior Art Design." Journal of Sensors 2022 (August 24, 2022): 1–8. http://dx.doi.org/10.1155/2022/2933085.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the rapid development of computer technology and automation technology, modern interior art design has attracted more and more attention. This paper chooses BIM technology and ZigBee technology, which have the advantages of low cost, low power consumption, low complexity, etc., and can be used to establish the communication protocol of indoor art design and home wireless network, so as to achieve residential comfort and wireless data security transmission and convenient, real-time monitoring. This paper starts with many environmental parameters that are closely related to human comfort, such as temperature and humidity, light, and air cleanliness, and conducts an investigation on the comfort of intelligent houses and the appreciation of modern indoor art; this paper discusses the security of BIM and ZigBee and the algorithm of AES starting from the specific implementation process; according to the internal characteristics and password requirements of the family, a smart home safety net is constructed and encrypted, so as to ensure the safe transmission of family information; complete the modern artistic design of the home controller. The hardware and software were constructed, and a web server was constructed on Linux, which was invoked using the CGI interface, thereby connecting the web server to the terminal device that was comfortably controlled. The test proves that the control scheme can work normally in the laboratory network, which has great guiding significance for practical work.
29

Ossi, Massimo. ""Pardon me, but your teeth are in my neck": Giambattista Marino, Claudio Monteverdi, and the bacio mordace." Journal of Musicology 21, no. 2 (2004): 175–200. http://dx.doi.org/10.1525/jm.2004.21.2.175.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Claudio Monteverdi's "Eccomi pronta ai baci" presents an odd pairing of a first-person female voice with a three-voice low male ensemble; in addition, the text, by Giambattista Marino, deals with the subject of the "bacio mordace" [biting kiss], and the female speaker invites her lover to kiss her but warns him against biting her. He of course betrays her, and the poem closes with her outraged complaint and vow never to kiss him again. The combination of text, singing voices, and expressive qualities invoked in the setting suggests that Monteverdi went beyond the conceit of Marino's madrigal in exaggerating the comic and parodistic (in the non-musicological sense of the word) aspects of the situation. In this essay, I explore the background of the kiss imagery, focusing specifically on the "bacio mordace" as an expression of "lover's furor" in Classical and Renaissance sources. I then relate the particular conceit of Marino's poem to Emanuele Tesauro's analysis of the dynamics of literary comedy: the device of decettione [deception or reversal] as part of the ridicolo [comedy] and its attendant burle [pranks]. Finally, I offer a reading of Monteverdi's madrigal in terms of Tesauro's definitions, in which I argue that the setting interjects an extra level of interpretation between the poet and the audience. This musical "filter" introduces new ambiguity into the poem's already equivocal situation, expanding its comic aspects.
30

Peng, Guozhen, and Hilary Chappell. "Ya33 ‘give’ as a valency increaser in Jinghpo nuclear serialization." Studies in Language 35, no. 1 (July 21, 2011): 128–67. http://dx.doi.org/10.1075/sl.35.1.05pen.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper analyzes serial verb constructions in Jinghpo formed by ya33 ‘give’, arguing that it has the function of a valency–increasing device in nuclear serialization: The use of ya33 allows the licensing of an additional beneficiary argument as a core argument to the lexical verb. In a new twist, however, on the evolution of give verbs, we demonstrate that the benefactive usage is extended to malefactive semantics in a distinct, derived structure, conditioned via the expression of possession, a type of malefactive that is not well-documented in current literature on this domain. Furthermore, the existence of two distinct constructions for the benefactive and the malefactive in Jinghpo conforms to Radetzky & Smith’s claim (2010: 116) that this is an areal feature comprising the Indian subcontinent, Southeast and East Asia, and thus contrasts strongly with the conflation of both types of construction in many European languages. Finally, we propose that the nuclear type of serialization, integral to the typological profile of Jinghpo, a SOV language, is a determining factor in the reanalysis of ya33. This feature is subsequently invoked to explain why the malefactive usage of ya33 constitutes a separate development from the well-attested pathway for give verbs leading to permissive causative verbs and adversative passive markers, which, while blocked in Jinghpo, is commonly found in many other East and Southeast Asian languages with core serialization. The present analysis is based on the variety of Jinghpo spoken in Luxi County, Yunnan Province, China, using, in the main, natural discourse data collected in the field.
31

Kassoti, Eva. "Between Sollen and Sein: The CJEU’s reliance on international law in the interpretation of economic agreements covering occupied territories." Leiden Journal of International Law 33, no. 2 (March 6, 2020): 371–89. http://dx.doi.org/10.1017/s0922156520000059.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThis contribution focuses on the Court of Justice of the European Union (Court or CJEU) reliance on international law in cases involving economic agreements covering occupied territories. In its earlier case law, the Court adopted a formalistic approach by ignoring the broader international legal framework of the dispute in an effort to achieve conformity with international law, while at the same time avoiding being drawn into political storms. The article continues by identifying an even more worrisome trend in the Court’s latest judgments in the Front Polisario and Western Sahara Campaign UK cases. In these two cases the Court showed its willingness to stretch the international rules of treaty interpretation to a breaking point in order to avoid pronouncing on the politically sensitive question of the de facto application of the EU’s agreements with Morocco in the territory of Western Sahara. The article concludes by asserting that the Court’s line of argumentation brings another dimension to the Völkerrechtsfreundlichkeit debate. The classical, binary understanding of the Court’s approach as ‘open/hostile’ to international law only provides us with a partial picture of how international law was actually used in these cases. The Court’s apparent willingness to rely on international law as a heuristic device to reinforce an outcome that radically departs from the logic and structure of international law and international legal argumentation requires a more in-depth engagement with both the content of the international law rules invoked in those judgments and with the Court’s use of such rules.
32

Kounis, Nicholas G., George D. Soufras, Grigorios Tsigkas, and George Hahalis. "Device Thrombosis With Continuous-Flow Left Ventricular Assist Devices: Is Kounis Syndrome Involved?" Artificial Organs 38, no. 6 (June 2014): 521–23. http://dx.doi.org/10.1111/aor.12320.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Iannaccone, G., M. Macucci, and B. Pellegrini. "Modeling of Shot Noise in Resonant Tunneling Structures." VLSI Design 8, no. 1-4 (January 1, 1998): 449–53. http://dx.doi.org/10.1155/1998/27313.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, we present insights into the transport properties and the geometrical structure of resonant tunneling devices that can be obtained by the study of their noise properties. We stress the importance of including noise behavior among the objectives of device simulations. The reason is twofold: on one hand, as the number of carriers involved in device operation decreases, fluctuations become more relevant; on the other hand, in devices whose functionality is based on quantum effects, noise properties strongly depend on the details of device geometry.
34

Bivolaru, Sorin, Ancuta Constantin, Constantin Marinel Vlase, and Cristian Gutu. "COPD Patients’ Behaviour When Involved in the Choice of Inhaler Device." Healthcare 11, no. 11 (May 30, 2023): 1606. http://dx.doi.org/10.3390/healthcare11111606.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background: Inhaler therapy plays a crucial role in controlling respiratory symptoms in patients with chronic obstructive pulmonary disease (COPD). Incorrect or partially correct use of inhaler devices causes many chronic obstructive pulmonary disease (COPD) patients to continue to have respiratory symptoms due to poor drug deposition in the airways as a result of poor inhaler technique, leading to increased healthcare costs due to exacerbations and multiple emergency room presentations. Choosing the right inhaler device for each individual patient is a bigger challenge for doctors and chronic obstructive pulmonary disease (COPD) patients. The type of inhaler device and the correct inhaler technique depends on the control of symptoms in chronic obstructive pulmonary disease (COPD). Physicians treating patients with chronic obstructive pulmonary disease (COPD) play a central role in educating patients about the correct use of inhalation devices. The steps for the correct use of inhalation devices should be taught to patients by doctors in the presence of the family so that if the patient has difficulties handling the device correctly, the family can support them. Methods: Our analysis included 200 subjects divided into two groups—recommended group (RG) and chosen group (CG)—and aimed primarily to identify the behaviour of chronic obstructive pulmonary disease (COPD) patients when faced with deciding which type of inhaler device is most suitable for them. The two groups were monitored three times during the 12-month follow-up period. Monitoring required the physical presence of the patient at the investigating physician’s office. The study included patients who were smokers, ex-smokers, and/or with significant exposure to occupational pollutants, aged over 40 years diagnosed with chronic obstructive pulmonary disease (COPD), risk group B and C according to the GOLD guideline staging, and on inhaled ICS+LABA treatment, although they had an indication for LAMA+LABA dual bronchodilation treatment. Patients presented for consultation on their own initiative for residual respiratory symptoms under background treatment with ICS+LABA. The investigating pulmonologist who offered consultations to all scheduled patients, on the occasion of the consultation, also checked the inclusion and exclusion criteria. If the patient did not meet the study entry criteria, they were assessed and received the appropriate treatment, and if the study entry criteria were met, the patient signed the consent and followed the steps recommended by the investigating pulmonologist. As a result, patient entry into the study was randomised 1:1, meaning that the first patient was recommended the inhaler device by the doctor and the next patient entered into the study was left to decide for themselves which type of device was most suitable for them. In both groups, the percentage of patients who had a different choice of inhaler device from that of their doctor was statistically significant. Results: Compliance to treatment at T12 was found to be low, but compared to results previously published on compliance, in our analysis, compliance was higher and the only reasons identified as responsible for the better results were related to the selection of the target groups and the regular assessments, where, in addition to reviewing the inhaler technique, patients were encouraged to continue treatment, thus creating a strong bond between patient and doctor. Conclusions: Our analysis revealed that empowering patients by involving them in the inhaler selection process increases adherence to inhaler treatment, reduces the number of mistakes in inhaler use of the inhaler device, and implicitly the number of exacerbations.
35

Simonin, Catherine. "Regulatory developments in the medical devices sector: A long and difficult journey." Regulatory Affairs Watch 5, no. 8 (June 2023): 1. http://dx.doi.org/10.54920/scto.2023.rawatch.8.1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Because the development of medical devices, device users, and the devices themselves often cross borders, medical device regulations in Switzerland are closely aligned with those of the European Union. Therefore, the Regulatory Affairs Watch editorial team wanted to hear first-hand from a European stakeholder who has been involved in this matter since the events that triggered the changes to European medical device regulation. In this first Deep Dive article, Catherine Simonin, MD, who is actively engaged in France’s Ligue contre le cancer (LCC, league against cancer) and the overarching national patient organisation France Assos Santé, discusses some of the drivers of regulatory changes for medical devices. The LCC has long been advocating for medical device legislation to focus more on patient safety, and the effects of its advocacy efforts can be seen in the EU’s changing legislative landscape. Using a Q&A format, Catherine Simonin also presents the perspective of patients and patient organisations on the EU’s recent Medical Device Regulation.
36

Morrow, Corey, Emily Johnson, Kit Simpson, and Na Jin Seo. "49824 Determining factors that influence adoption of new post-stroke physical rehabilitation devices." Journal of Clinical and Translational Science 5, s1 (March 2021): 56–57. http://dx.doi.org/10.1017/cts.2021.549.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT IMPACT: This work will accelerate the translation of post stroke rehabilitation devices from the research lab to clinic use. OBJECTIVES/GOALS: Rehabilitation device efficacy alone does not lead to adoption into clinical practice. The objective of this work was to increase understanding of the landscape for clinical adoption of post-stroke physical rehabilitation devices. METHODS/STUDY POPULATION: We conducted interviews with 107 stakeholders including patients who have had strokes, rehab directors, and physical/occupational therapists to understand their viewpoints for adopting new rehabilitation devices. To contribute to previous literature, interviews were analyzed qualitatively using direct content analysis to provide more specific details about the most appropriate adoption settings, specific roles for stakeholders, and drivers for all stakeholders involved in the adoption process. RESULTS/ANTICIPATED RESULTS: Unique to this work, care settings in which therapy goals are best aligned for restorative devices were found to be outpatient rehabilitation, followed by inpatient rehabilitation. Therapists are the major influencers for adoption because they typically introduce new rehabilitation devices to patients for both clinic and home use. We also learned therapists’ utilization rate of a rehabilitation device influences a rehabilitation director’s decision to acquire the device for facility use. Additionally, device setup in <7 minutes will allow for increased use without reducing therapist productivity. DISCUSSION/SIGNIFICANCE OF FINDINGS: Rehabilitation device development should consider the best settings to first introduce the device, roles of each stakeholder, and drivers that influence each stakeholder to accelerate successful adoption of the developed device.
37

Lopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.
38

Gorantla, Naga Rekha, and Bala Subrahmanya Mungila Hillemane. "Determinants of performance measures of clinical trials: a study of Indian medical devices industry." International Journal of Clinical Trials 5, no. 4 (October 24, 2018): 186. http://dx.doi.org/10.18203/2349-3259.ijct20184400.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p class="abstract">Developing new medical devices require extensive clinical investigations to enter the market successfully. In recent years, India has emerged as one of the attractive and most preferred countries to carry out clinical trials, primarily due to diverse human gene pool and cost-competitiveness. However, unlike other healthcare products such as therapeutic drugs, there is a lack of regulations over usage of medical devices. Moreover, prior systematic empirical analysis that examine the medical device based clinical trials is also not well established. This study attempted to ascertain the determinants of participant recruitment, selection of locations and time taken to conduct medical device clinical trials. Medical devices that are clinically tested in India in the period of 2008 to 2014 were obtained from CTRI website. 108 out of 279 records were identified as medical device clinical trial registrations. Collected data was analyzed to know the device type, disease category, sponsors involved, participant enrolment, locations and the duration of the device trial. In this study, the category of sponsorship, device type and disease category were found to have significant influence with respect to the selection of number of participants, locations and the time taken to execute medical device clinical trials.</p>
39

Pietzsch, Jan B., Lauren M. Aquino, Paul G. Yock, M. Elisabeth Paté-Cornell, and John H. Linehan. "Review of U.S. Medical Device Regulation." Journal of Medical Devices 1, no. 4 (October 19, 2007): 283–92. http://dx.doi.org/10.1115/1.2812429.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Medical device regulation plays a significant role in the design, development, and commercialization of new medical technologies. A comprehensive understanding of the various regulatory requirements and their practical implementation is thus an essential cornerstone of successful medical device innovation. In this paper, we review the background, mission, and statutory requirements of medical device regulation in the United States. As opposed to pharmaceuticals, which have been regulated since the early 1900s, medical device regulation was not enacted before 1976, when Congress signed into law the Medical Device Amendments to the Federal Food, Drug and Cosmetic Act of 1938. The U.S. Food and Drug Administration (FDA) has implemented a risk-based classification system, which is essential in determining the regulatory pathway for a given device. Our review of the different regulatory pathways discusses the specific steps and requirements associated with each pathway, and their implications for development and testing of different types of devices. The differences in these pathways are significant, and thus require careful consideration and analysis already at early stages of development. The FDA’s Quality Systems Regulation, which outlines specific requirements for development, testing, production, and postmarket surveillance, is another important aspect of device regulation. We present its elements and relationship to design controls and other operating procedures implemented by device manufacturers, and discuss their relevance in ensuring the safety and effectiveness of marketed devices. A summary of recent additions to device regulation, implemented by the FDA to allow for adequate regulation of products that combine drugs and devices or biologics and devices (so-called combination products), completes our review. Because of the significance of device regulation for medical device innovation, we strongly support increased efforts to educate the various stakeholders involved in the medical device development process, both at the academic and professional level.
40

Blum, Emily C., Carolyn R. Martz, Yelena Selektor, Hassan Nemeh, Zachary R. Smith, and Long To. "Anticoagulation of Percutaneous Ventricular Assist Device Using Argatroban-Based Purge Solution: A Case Series." Journal of Pharmacy Practice 31, no. 5 (August 23, 2017): 514–18. http://dx.doi.org/10.1177/0897190017727191.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Impella devices are percutaneously inserted ventricular assist devices which require a continuous purge solution that contains heparin to prevent pump thrombosis and device failure. We describe 2 patients with heparin-induced thrombocytopenia (HIT) supported with an Impella device utilizing an argatroban-based purge solution. Case 1 involved an 83-year-old female with biventricular failure which resulted in right ventricle Impella support. The purge solution was changed to include argatroban due to concern of device clotting in the setting of HIT. Case 2 involved a 55-year-old male with worsening cardiogenic shock which resulted in left ventricle Impella support. Due to decreased purge flow rates and concerns for clotting, argatroban was added to the purge solution. Both patients’ total argatroban regimens were monitored and adjusted by pharmacy, resulting in therapeutic anticoagulation without any major bleeding or thrombotic events. Subsequently, a protocol was designed and implemented. These case reports appear to demonstrate the safe and effective use of argatroban purge solutions for the necessary anticoagulation with an Impella device. Further studies are needed to confirm these results and determine the optimal dosing regimen.
41

Jing, Xuyang, Cong Wang, Wenjing Feng, Na Xing, Hanmei Jiang, Xiangyu Lu, Yifu Zhang, and Changgong Meng. "Hierarchical VOOH hollow spheres for symmetrical and asymmetrical supercapacitor devices." Royal Society Open Science 5, no. 1 (January 2018): 171768. http://dx.doi.org/10.1098/rsos.171768.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Hierarchical VOOH hollow spheres with low crystallinity composed of nanoparticles were prepared by a facile and template-free method, which involved a precipitation of precursor microspheres in aqueous solution at room temperature and subsequent hydrothermal reaction. Quasi-solid-state symmetric and asymmetric supercapacitor (SSC and ASC) devices were fabricated using hierarchical VOOH hollow spheres as the electrodes, and the electrochemical properties of the VOOH//VOOH SSC device and the VOOH//AC ASC device were studied by cyclic voltammetry (CV), galvanostatic charge–discharge (GCD) and electrochemical impedance spectroscopy (EIS). Results demonstrated that the electrochemical performance of the VOOH//AC ASC device was better than that of the VOOH//VOOH SSC device. After 3000 cycles, the specific capacitance of the VOOH//AC ASC device retains 83% of the initial capacitance, while the VOOH//VOOH SSC device retains only 7.7%. Findings in this work proved that hierarchical VOOH hollow spheres could be a promising candidate as an ideal electrode material for supercapacitor devices.
42

Holmes, S. N., J. M. Riley, P. Juneau, D. Pyne, and G. L. Hofing. "Short-term evaluation of a foraging device for non-human primates." Laboratory Animals 29, no. 4 (October 1, 1995): 364–69. http://dx.doi.org/10.1258/002367795780740096.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the USA, any institution involved in using non-human primates for research has had, for regulatory reasons, to address the psychological needs of these animals. Enriching the environment through the use of foraging devices has been one method and a study was designed to evaluate the short-term effect of a new foraging device on singly-housed cynomolgus monkeys. The study was divided into 3 one-week periods of observation: baseline, device filled with normal ration, and device filled with a novel food. Four behaviours were recorded: foraging, self-directed, hopper feeding, and other behaviours. During the observation periods the device was accepted in preference to the standard hopper style feeder and self-directed behaviours were significantly reduced compared with the baseline period. Changing to a novel food re-kindled interest in the device and reduced the extinguishing effect: i.e. decrease in interest or use of the device. Based on this study, the feeder has been included with several other devices in a rotation programme.
43

Wu, Yin He, and Dai Ping Li. "Analysis Based on iOS Application Malicious Behavior Detection." Applied Mechanics and Materials 602-605 (August 2014): 2321–25. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2321.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Due to the highly developed modern technology,Smart phones and other mobile devices are become more and more universal. Most of those devices are used to process or store sensitive and confidential data.Consequently,it may cause many problems,such as privacy disclosure,mobile phone virus,spyware,etc. In order to solve those issues,We need to monitor applications`s behaviour to tell those malicious ones. Here we use MobileSubstrate to hook every sensitive system API the application invokes in iOS planform,and send this invocation to our matching algorithm,the matching algorithm will evaluate if the API are being invoked in a safe way according to Application API Review Model.If a application trying to call some APIs which is totally unnecessary,we can reject this invoke and give user a warning.
44

dos Santos, Thâmela Thaís Santos, Amélia Pasqual Marques, Luis Carlos Pereira Monteiro, Enzo Gabriel da Rocha Santos, Gustavo Henrique Lima Pinto, Anderson Belgamo, Anselmo de Athayde Costa e Silva, et al. "Intra and Inter-Device Reliabilities of the Instrumented Timed-Up and Go Test Using Smartphones in Young Adult Population." Sensors 24, no. 9 (May 3, 2024): 2918. http://dx.doi.org/10.3390/s24092918.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Timed-Up and Go (TUG) test is widely utilized by healthcare professionals for assessing fall risk and mobility due to its practicality. Currently, test results are based solely on execution time, but integrating technological devices into the test can provide additional information to enhance result accuracy. This study aimed to assess the reliability of smartphone-based instrumented TUG (iTUG) parameters. We conducted evaluations of intra- and inter-device reliabilities, hypothesizing that iTUG parameters would be replicable across all experiments. A total of 30 individuals participated in Experiment A to assess intra-device reliability, while Experiment B involved 15 individuals to evaluate inter-device reliability. The smartphone was securely attached to participants’ bodies at the lumbar spine level between the L3 and L5 vertebrae. In Experiment A, subjects performed the TUG test three times using the same device, with a 5 min interval between each trial. Experiment B required participants to perform three trials using different devices, with the same time interval between trials. Comparing stopwatch and smartphone measurements in Experiment A, no significant differences in test duration were found between the two devices. A perfect correlation and Bland–Altman analysis indicated good agreement between devices. Intra-device reliability analysis in Experiment A revealed significant reliability in nine out of eleven variables, with four variables showing excellent reliability and five showing moderate to high reliability. In Experiment B, inter-device reliability was observed among different smartphone devices, with nine out of eleven variables demonstrating significant reliability. Notable differences were found in angular velocity peak at the first and second turns between specific devices, emphasizing the importance of considering device variations in inertial measurements. Hence, smartphone inertial sensors present a valid, applicable, and feasible alternative for TUG assessment.
45

Kwong, Man Ting, David Stell, and Emmanuel Akinluyi. "Medical Device Regulation from a Health Service Provider’s Perspective." Prosthesis 3, no. 3 (September 14, 2021): 261–66. http://dx.doi.org/10.3390/prosthesis3030025.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Unfamiliarity with medical device regulations can sometimes be a barrier to deploying technology in a clinical setting for researchers and innovators. Health service providers recognise that innovation can happen within smaller organisations, where regulatory support may be limited. This article sets out to increase transparency and outline key considerations on medical device regulations from a UK healthcare provider’s perspective. The framework used by Guy’s and St Thomas’ NHS Foundation Trust (GSTFT) for assessing research devices is presented to give an overview of the routes that R&D medical devices take to enter a clinical setting. Furthermore, current trends on research studies involving medical devices were extracted from the GSTFT internal R&D database and presented as the following categories (i) commercial vs. non-commercial, (ii) assessment type and (iii) software vs. non-software. New medical devices legislation will be introduced within the UK in July 2023. It is anticipated regulating software as a medical device may become more challenging for healthcare providers and device manufacturers alike. It is therefore important for different stakeholders involved to work together to ensure this does not become a barrier to innovation.
46

Ottino, Maria Chiara, Andrea Argentero, Pier Angelo Argentero, Giacomo Garzaro, and Carla Maria Zotti. "Needlestick prevention devices: data from hospital surveillance in Piedmont, Italy—comprehensive analysis on needlestick injuries between healthcare workers after the introduction of safety devices." BMJ Open 9, no. 11 (November 2019): e030576. http://dx.doi.org/10.1136/bmjopen-2019-030576.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ObjectiveNeedlestick and sharps injuries (NSIs) involving healthcare workers (HCWs) are worldwide under surveillance since long time; the implementation of the European Directive 32/2010 regarding the mandatory use of safety-engineered devices (SEDs) seems to have reduced the number of these accidents. Our surveillance investigated the frequency and the modality of SED-related NSIs in the Piedmont region to verify changes in the epidemiology of these events.MethodsWe analysed the exposure records of NSIs, device usage data and structural data of 42 acute care hospitals and compared conventional and safety devices. We calculated the accident rates per 100 000 needles and, as a measure of SED efficacy, the relative risk between the use of safety and non-safety devices with a 95% CI. We also described the dynamics of the NSIs and the most involved professional groups of HCWs, procedures and devices.ResultsTotal and specific device accident rates for 100 000 needles were lower with the use of SEDs. In 2015–2016, there were 1640 NSIs, with a decreasing absolute number during the observation period; 18% were SEDs related. Half of the total accidents with SEDs occurred in the patient’s room, and nurses were involved in 78% of the cases. The most involved devices were the butterfly needles and peripheral venous catheters, and the most involved procedures were venous sampling (40%) and phlebotherapy (16%). The exposures occurred mostly during the procedure, and 45% of the SED-related injuries occurred during the disposal of the device; 92% of the SEDs involved had a manual activation mechanism.ConclusionIn agreement with the results of other European studies, our results show that SEDs reduce the risk of percutaneous exposure of HCWs, but in introducing SEDs, we must select those with a higher level of safety (with a passive activation mechanism) and improve the healthcare staff training programmes.
47

Awan, Samia Masood, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed, and Tahir Sharif. "A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT." Information 14, no. 2 (February 16, 2023): 129. http://dx.doi.org/10.3390/info14020129.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and transmitting into the centralized database for advanced analytics and analysis. This integrated and connected setup allows greater levels of automation of smart systems than is possible with just the Internet. While delivering services to the different processes and application within connected smart systems, these IoT devices perform an impeccably large number of device-to-device communications that allow them to access the selected subsets of device information and data. The sensitive and private nature of these data renders the smart infrastructure vulnerable to copious attacks which threat agents exploit for cyberattacks which not only affect critical services but probably bring threat to people’s lives. Hence, advanced measures need to be taken for securing smart environments, such as dynamic access control, advanced network screening, and monitoring behavioural anomalies. In this paper, we have discussed the essential cyberthreats and vulnerabilities in smart environments and proposed ZAIB (Zero-Trust and ABAC for IoT using Blockchain), a novel secure framework that monitors and facilitates device-to-device communications with different levels of access-controlled mechanisms based on environmental parameters and device behaviour. It is protected by zero-trust architecture and provides dynamic behavioural analysis of IoT devices by calculating device trust levels for each request. ZAIB enforces variable policies specifically generated for each scenario by using attribute-based access control (ABAC). We have used blockchain to ensure anonymous device and user registrations and immutable activity logs. All the attributes, trust level histories, and data generated by IoT devices are protected using IPFS. Finally, a security evaluation shows that ZAIB satisfies the needs of active defence and end-to-end security enforcement of data, users, and services involved in a smart grid network.
48

Abdul Rahman, Khairiyah, Aizreena Azaman, Hadafi Fitri Mohd Latip, Mohd Azuwan Mat Dzahir, and Malarvili Balakrishnan. "Comparison of tibialis anterior and gastrocnemius muscles activation on balance training devices and hoverboard." Malaysian Journal of Fundamental and Applied Sciences 13, no. 4-2 (December 17, 2017): 495–500. http://dx.doi.org/10.11113/mjfas.v13n4-2.820.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Balance training devices such as wobble board, basu ball and balance cushion are the tool use in balance training exercise programme in order to improve muscle strength and restore posture balance due degeneration of body function or injury. Recently, self-balancing scooter such as Segway and hover board showed a positive effects on rehabilitation. However, it is less known how these devices affect muscle physiological properties. This study aims to to measure ankle muscles activation on difference balance training devices and hover board. Besides, a comparison between these device will be done in order to identify if hover board has a promising feature to be an alternative balance training device. In this research, surface EMG (sEMG) was used to record tibialis anterior and gastrocnemius muscle activities. Seventeen healthy subjects were required to stand on three different types of balance training device such as wobble board, balance cushion, bosu ball and a hover board. They were asked to maintain their standing position on each devices for two minutes. Both time domain and frequency domain analysis were used to identify the features of the EMG signal. Time domain analysis measurement involved average rectified value (ARV) and root mean square (RMS), meanwhile for frequency domain, median frequency (MDF) of the signal were measured. The results shows that, the RMS is differed significantly between the balance training devices (p<0.05) for tibialis anterior muscle but not gastrocnemius muscle. Meanwhile, no significant difference between the devices in the ARV and the MDF value (p>0.05). Besides, less stable devices increased muscle activity were observed. There is not much difference between hover board and the other devices in term of physiological effects of both tibialis anterior and gastrochemious muscle. It is also suggested that hover board offers a promising feature to be an alternative device for balance training device.
49

Qingru Ma, Qingru Ma, and Haowen Tan Qingru Ma. "D2D Group Key Agreement Scheme for Smart Devices in HANs." 網際網路技術學刊 24, no. 3 (May 2023): 659–64. http://dx.doi.org/10.53106/160792642023052403011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p>The home area network (HAN) is one of the most widely researched areas in recent years. HANs integrate 5G/6G networks and artificial intelligence technology to provide data services for home users. The devices in HANs collect and transmit data relating to users&rsquo; daily activities for analysis by remote service providers. These data often contain a large number of users&rsquo; personal privacy. The disclosure of these data could have far-reaching consequences for the privacy of the individuals involved. Some researchers are dedicated to investigating the authentication of smart devices by the system. However, the increased frequency of interactions between devices and gateways, as well as between devices themselves, is a defining characteristic of HANs. In this paper, a device-to-gateway (D2G) authentication scheme is proposed. Based on the authentication result, a partial key is generated for smart devices and the gateway. Finally, a device-to-device (D2D) group key agreement scheme is presented. The security and efficiency of the proposed scheme are proved according to the analysis.</p> <p>&nbsp;</p>
50

Lim, Hyun-Kyo, Ju-Bong Kim, Joo-Seong Heo, and Youn-Hee Han. "Federated Reinforcement Learning for Training Control Policies on Multiple IoT Devices." Sensors 20, no. 5 (March 2, 2020): 1359. http://dx.doi.org/10.3390/s20051359.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Reinforcement learning has recently been studied in various fields and also used to optimally control IoT devices supporting the expansion of Internet connection beyond the usual standard devices. In this paper, we try to allow multiple reinforcement learning agents to learn optimal control policy on their own IoT devices of the same type but with slightly different dynamics. For such multiple IoT devices, there is no guarantee that an agent who interacts only with one IoT device and learns the optimal control policy will also control another IoT device well. Therefore, we may need to apply independent reinforcement learning to each IoT device individually, which requires a costly or time-consuming effort. To solve this problem, we propose a new federated reinforcement learning architecture where each agent working on its independent IoT device shares their learning experience (i.e., the gradient of loss function) with each other, and transfers a mature policy model parameters into other agents. They accelerate its learning process by using mature parameters. We incorporate the actor–critic proximal policy optimization (Actor–Critic PPO) algorithm into each agent in the proposed collaborative architecture and propose an efficient procedure for the gradient sharing and the model transfer. Using multiple rotary inverted pendulum devices interconnected via a network switch, we demonstrate that the proposed federated reinforcement learning scheme can effectively facilitate the learning process for multiple IoT devices and that the learning speed can be faster if more agents are involved.

До бібліографії