Showing 4,221 - 4,240 results of 4,508 for search '"The Forward"', query time: 0.08s Refine Results
  1. 4221

    Level-8 Ph.D. Programs In Medical Sciences: High Time For The Higher Education Commission (HEC) Of Pakistan To Establish A Medical Wing by Wafa Omer

    Published 2024-04-01
    “…Last but not least another major problem that is being faced by the post-graduate trainees during their studies is that the list of approved journals on the website of HEC differs from those which are approved or recognised by PMDC leading to further mayhem as the trainees remain in a state of uncertainty when it comes to publishing their research work.10,11 Recommendations: What is the way forward? It’s simple! The dire need of the hour is to encourage doctors to opt for specialization may it be PhD, Fellowship or MD/MS and the curriculum should be modified in a way to produce a multifaceted doctor who is an Academician, Researcher and clinician without restricting or creating undue hinderances in the progression of the medical community. …”
    Get full text
    Article
  2. 4222

    Study on Innovative Practices to Promote Girls’ Retention and Transition to Secondary and Higher Learning Institutions in Sub-Saharan Africa. by Ayiga, Natal, Adyanga, Francis Akena, Akello, Jacqueline

    Published 2024
    “…Parents of girls, found pregnant are summoned to school to appropriately evacuate them home and plan for the way forward. c. School send girls home as soon as they are discovered pregnant and pregnant learners and their parents are counseled on the type of support and care the girls need during pregnancy. d. …”
    Get full text
    Technical Report
  3. 4223

    DeepAptamer: Advancing high-affinity aptamer discovery with a hybrid deep learning model by Xin Yang, Chi Ho Chan, Shanshan Yao, Hang Yin Chu, Minchuan Lyu, Ziqi Chen, Huan Xiao, Yuan Ma, Sifan Yu, Fangfei Li, Jin Liu, Luyao Wang, Zongkang Zhang, Bao-Ting Zhang, Lu Zhang, Aiping Lu, Yaofeng Wang, Ge Zhang, Yuanyuan Yu

    Published 2025-03-01
    “…This represented a notable leap forward in aptamer technology, with broad implications for its application across a spectrum of selection targets.…”
    Get full text
    Article
  4. 4224

    Decolonization Projects by Cornelius Ewuoso

    Published 2023-09-01
    “…At the funding level, many grant-awarding agencies like Wellcome Trust have dedicated huge budgets to studies that help them understand how they may have perpetrated colonialism or neocolonialism and what they can do differently going forward.[20] In South Africa, promulgating the Employment Equity Act 55 was a tangible attempt to entrench decolonization concerns in a country's regulatory framework. …”
    Get full text
    Article
  5. 4225

    Pricing and Allotment in a Sea-Cargo Supply Chain with Reference Effect: A Dynamic Game Approach by Lei Xu, Govindan Kannan, Xiaoli Yang, Jian Li, Xiukun Zhao

    Published 2013-01-01
    “…The contract between the carrier and forwarder is a long-term issue, and the repeated contract business makes the forwarder develop a reference point based on the contract prices, and this reference effect, to a large extent, affects the forwarder’s contract purchasing decisions. …”
    Get full text
    Article
  6. 4226

    Vehicle density based multihop broadcast protocol in VANET by Jia-wei HUANG, Shao-hua ZHONG, Lian-hai LIU, Jian-xin WANG

    Published 2016-12-01
    “…Contemporary multihop broadcast protocols in VANET usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. …”
    Get full text
    Article
  7. 4227

    Stiffness characteristics of the lower extremities in Women’s Chinese Basketball Association competition athletes: normative values and position differences by Dan Wang, Zhihai Wang, Mingming Yang, Kaiyuan Qu, Xinyu Mao, Xin Yang, Zhiye Zhang, Che Shao, Eamonn Delahunt, Eamonn Delahunt, Wenxuan Fang

    Published 2025-02-01
    “…Vertical stiffness was also evaluated by OptoGait system.ResultsDescriptive statistics were used to establish the normative values of stiffness for forwards, centres and guards. The Kruskal Wallis test and post hoc Bonferroni pairwise comparisons found significant higher stiffness of the left patellar tendon (PT) in guards than centres (p = 0.004) and in guards than forwards (p = 0.012), right PT stiffness in guards than centres (p = 0.016) and in guards than forwards (p = 0.017), mean PT stiffness in guards than centres (p = 0.003) and in guards than forwards (p = 0.008); stiffness of the right soleus (SOL) in guards than forwards (p = 0.033), stiffness of the left biceps femoris (BF) in forwards than centres (p = 0.049) and in guards than centres (p = 0.038); and stiffness of the left vertical stiffness (hopping) in forwards than centres (p = 0.041).ConclusionForwards, centres and guards were characterised by significantly different stiffness values, which could be utilised for improvement of athletic performance and injury prevention.…”
    Get full text
    Article
  8. 4228

    Research on a very energy-efficient and low-delay flooding algorithm for wireless sensor network by LI Fang-min1, LIU Xin-hua1, KUANG Hai-lan2

    Published 2007-01-01
    “…A novel flooding algorithm called priority covering algorithm was proposed for wireless sensor network.In the algorithm,a method of priority covering was used for assigning different forwarding priorities to vicinity nodes so as to make the flooding packet cover the whole network rapidly;a scheme of restrained forwarding and a scheme of dynamic delay for forwarding were used for restraining the redundant flooding packets and reducing the conflicting retransmission overhead.The result of simulation shows that the algorithm is more energy-efficient and low-delay than those similar flooding algorithms proposed.…”
    Get full text
    Article
  9. 4229

    Clustering routing protocol based on improved PSO algorithm in WSN by Xiaonian WU, Chuyun ZHANG, Runlian ZHANG, Yaping SUN

    Published 2019-12-01
    “…Aiming at the problem that the location distribution of cluster head nodes filtered by wireless sensor network clustering routing protocol was unbalanced and the data transmission path of forwarding nodes was unreasonable,which would increase the energy consumption of nodes and shorten the network life cycle,a clustering routing protocol based on improved particle swarm optimization algorithm was proposed.In the process of cluster head election,a new fitness function was established by defining the energy factor and position equalization factor of the node,the better candidate cluster head node was evaluated and selected,the position update speed of the candidate cluster head nodes was adjusted by the optimized update learning factor,the local search and speeded up the convergence of the global search was expanded.According to the distance between the forwarding node and the base station,the single-hop or multi-hop transmission mode was adopted,and a multi-hop method was designed based on the minimum spanning tree to select an optimal multi-hop path for the data transmission of the forwarding node.Simulation results show that the clustering routing protocol based on improved particle swarm optimization algorithm can elect cluster head nodes and forwarding nodes with more balanced energy and location,which shortened the communication distance of the network.The energy consumption of nodes is lower and more balanced,effectively extending the network life cycle.…”
    Get full text
    Article
  10. 4230

    Tracing IP-spoofed packets in software defined network by Songjie WEI, Xin SUN, Rudong ZHAO, Chao WU

    Published 2018-11-01
    “…IP packets back tracing is to find the source host hop by hop from the destination.The method found the forwarding path of target packets and source host by adding probe entry into flow tables on SDN switches and analyzing the effective back tracing Packet-in messages sent by related switches.The proposed scheme can provide convenience for debugging network problems ,so that the network administrator can obtain the forwarding paths of any data packets.Furthermore,it can help to solve the problem of IP spoofing.Experimental results prove that the traceability method can find the forwarding paths of target packets in a timely and accurate manner without affecting other traffic or significant system overhead.…”
    Get full text
    Article
  11. 4231

    Researcb on Enbanced Multi-Hop Broadcast Algoritbm in Vebicular Communications by Haitao Zhao, Hongbo Zhu, Nanjie Liu, Gengxiong Cai

    Published 2014-09-01
    “…An enhanced neighbor information-based multi-hop broadcast protocol(ENIMBP)in highway scenarios was proposed, which calculated the forwarding waiting time by using vehicle neighbor information as well as position, speed and direction to select the optimal forwarding vehicle. …”
    Get full text
    Article
  12. 4232

    An energy balance AODV protocol with multicast route discovery for wireless body area networks by Jin TAN, Yujuan ZHANG

    Published 2016-08-01
    “…In AODV protocol with the dynamic topology networks,the source node S requests a route to an arbitrary destination node D with flooding broadcast the RREQ message,but there is only one destination node sink in a WBAN,other nodes involved in receiving and forwarding RREQ have wasted energy except the nodes on minimum hop count routing.An energy balance AODV protocol with multicast route discovery for wireless body area networks was proposed,it increased the minimum hop count to sink hops,the next hop node to sink next and the node itself has the forwarding capability isforward three parameters in a hello message,and selects neighbors which could reach the sink only to participate in forwarding the RREQ message.This protocol effectively reduces the energy cost of the routing discovery through changing the broadcast to multicast,and prolongs the service life of WBAN with energy balance.The performance analysis and simulation experiment indicate that the proposed protocol is more advantaged than similar EAAODV in the number of RREQ,packet delivery ratio and energy consumption.…”
    Get full text
    Article
  13. 4233

    Intelligent scheduling mechanism of time-sensitive network modal in polymorphic network by Sijin YANG, Lei ZHUANG, Yu SONG, Jiaxing WANG, Xinyu YANG

    Published 2022-05-01
    “…For the problems of uncertain forwarding scheduling and long solving time of time-sensitive network modal in polymorphic network, a joint routing and scheduling mechanism of time-sensitive network modal based on CSQF was proposed.Considering the requirement of bounded delay, network state and different routing mechanisms, a hybrid resource scheduling problem of joint cache queue and routing was formulated to optimize the resource usage of the entire network.Then, the traffic characteristics and cache queue utilization was used to predict the cache utilization of the next cycle, which was based on deep reinforcement learning.In addition, by using multi-queue CSQF forwarding scheduling mechanism and explicit routing algorithm based on cache utilization, an iterative scheduling algorithm was proposed to achieve deterministic forwarding and resource allocation.Simulation results show that the mechanism can effectively adjust the transmission scheduling of deterministic applications according to the resource usage of the network, and has better schedulability compared with other off-line scheduling mechanisms.…”
    Get full text
    Article
  14. 4234

    The Bioethics-CSR Divide by Caio Caesar Dib

    Published 2024-03-01
    “…Bioethics was part of the trend as it would be carried forward by movements such as feminism and the patients’ rights movement.[9] Bioethics would gradually move from a public discourse centered around the responsible use of science and technology to academic and government spaces.[10]  This evolution led to an increasing emphasis on intellectual rigor and governance. …”
    Get full text
    Article
  15. 4235

    Multipath inter-domain routing for named data networking by Xiao-yan HU, Jian GONG

    Published 2015-10-01
    “…To facilitate content retrieval among NDN domains,a multipath inter-domain routing for named data networking(MIRNDN)was proposed.Under MIRNDN,an AS(autonomous system)maintained merely the routing state of content reachable from its own network or from its customers’ networks and aggregated routing information to mitigate routing scalability issue; “valley free”routing policy was applied to guide Interest packets that solicit content unreachable from the AS’s own network nor from its customers’ networks to explore matching data packets via multiple paths,and NDN’s requests aggregation,in-network caching and adaptive forwarding optimized such exploration; the reachability information of content from multiple paths was collected to support Interest multipath forwarding.The properties of FIB size and the convergence time and communication cost of routing update under MIRNDN were analyzed in theory.The experimental results in the AS level topology of current Internet validates that MIRNDN mitigates the scalability issue of NDN inter-domain routing,has relative short convergence time and moderate communication cost for routing update,and effectively reduces unnecessary Interest forwarding.…”
    Get full text
    Article
  16. 4236

    Zero trust management of data flow between IoT edge nodes based on SDN by XIAO Jingxu, GUO Yuanbo, CHANG Chaowen, WU Ping, YANG Chenli

    Published 2024-07-01
    “…The experimental results show that the method introduces a forwarding delay of less than 10% and a throughput loss of less than 8%.…”
    Get full text
    Article
  17. 4237

    Preventing flow table overflow against denial of service attack in software defined network by Dongbin WANG, Dongzhe WU, Hui ZHI, Kun GUO, Xu ZHANG, Jinqiao SHI, Yu ZHANG, Yueming LU

    Published 2023-02-01
    “…Aiming at denial of service attacks would cause overflow of the limited flow table space of the switch in software defined network, failure to install flow table rules for normal network packets, packet forwarding delay, and packet loss, FloodMitigation was proposed to prevent flow table overflow against denial of service attacks in software defined network.The management of the rate-limit flow rule installation based on available flow table space was adopted to limit the maximum installation speed of flow rules and the number of flow table space occupied by switch ports with denial-of-service attacks, and avoid flow table overflow.In addition, path selection based on available flow table space was adopted to balance flow table utilization of switches among multiple forwarding paths to avoid denial of service attacks on switches with less available flow table in the path.The experimental results demonstrate that FloodMitigation can effectively alleviate the harm of denial of service attacks in terms of preventing switch flow table overflow and packet loss, reducing resource consumption of controllers, and ensuring packet forwarding delay.…”
    Get full text
    Article
  18. 4238
  19. 4239

    Collaborative opportunistic routing in wireless sensor networks by HU Hai-feng, YANG Zhen

    Published 2009-01-01
    “…The routing objective was to provide robustness to the random variations in network con-nectivity while ensuring better data forwarding efficiency in an energy efficient manner. …”
    Get full text
    Article
  20. 4240

    Flow-splitting algorithm of MPLS single label based on programmable router by Lai-quan HAN, Jin-kuan WANG, Xing-wei WANG

    Published 2014-05-01
    “…MultipathMPLS implementes the flow-splitting transmission for the same FEC (forwarding equivalence class). Via the network simulation tool (NS2), this algorithm can obtain the high forwarding performance of MPLS, high throughput of concurrent multi-path and flexible configuration of programmable router.…”
    Get full text
    Article