Filters








57,598 Hits in 2.6 sec

Forging a New Space for Lay Male Piety: St. Vincent de Paul Societies in Urban Quebec and Ontario, 1846–1890

Michael Gauvreau
2009 Histoire sociale / Social History  
Vincent de Paul.  ...  Vincent de Paul, Toronto.  ... 
doi:10.1353/his.0.0055 fatcat:v7mnpuc7mjehlj2dhum66vs6iq

Laying foundation stones

Vincent Thoubridge
1941 Notes and Queries  
Sr, Vincent TROUBRIDGE. ERLIN AND THE “MERLIN CHAIR.”’  ... 
doi:10.1093/nq/180.21.372a fatcat:p4ojnbszf5etre3im7ex5at4wa

Lay Theories of Essentialism

Stéphanie Demoulin, Jacques-Philippe Leyens, Vincent Yzerbyt
2006 Group Processes & Intergroup Relations  
We argue that lay perceptions of social categories vary along three dimensions: natural kind-ness, entitativity, and essentialism.  ...  Forced and chosen social categories Recently, Lickel and colleagues (2000) proposed to investigate lay theories people hold about groups in their environment and found that lay perceivers have intuitive  ...  Demoulin et al. lay theories of essentialism 37 To summarize, essentialism refers to lay people's belief that, although group members may differ from one another at the surface level, group members very  ... 
doi:10.1177/1368430206059856 fatcat:bon5gnezerhqdovyoafxpqq2t4

Authentication over Noisy Channels [article]

Lifeng Lai, Hesham El Gamal, H. Vincent Poor
2008 arXiv   pre-print
In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios,
more » ... wer and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.
arXiv:0802.2701v1 fatcat:nxn46rxdo5bkhhra7mr3knez7m

Genetic improvement of laying hens viability using survival analysis

Vincent Ducrocq, Badi Besbes, Michel Protais
2000 Genetics Selection Evolution  
The survival of about eight generations of a large strain of laying hens was analysed separating the rearing period (RP) from the production period (PP), after hens were housed.  ...  1.7% at 300 days for PP), suggesting that selection based on solutions from the frailty models could be efficient, despite the very large proportion of censored records. survival analysis / viability / laying  ...  Genetic evaluation and selection Selection of this strain of laying hens did not include any viability trait during the studied period.  ... 
doi:10.1051/gse:2000104 pmid:14736405 pmcid:PMC2706858 fatcat:7s3y4ju2z5cotfuigvlbfgomoy

Genetic improvement of laying hens viability using survival analysis

Vincent Ducrocq, Badi Besbes, Michel Protais
2000 Genetics Selection Evolution  
The survival of about eight generations of a large strain of laying hens was analysed separating the rearing period (RP) from the production period (PP), after hens were housed.  ...  1.7% at 300 days for PP), suggesting that selection based on solutions from the frailty models could be efficient, despite the very large proportion of censored records. survival analysis / viability / laying  ...  Genetic evaluation and selection Selection of this strain of laying hens did not include any viability trait during the studied period.  ... 
doi:10.1186/1297-9686-32-1-23 fatcat:gu3vbmwjdnhavpp42j2arhc54u

Bayesian methods for predicting LAI and soil water content

Majdi Mansouri, Benjamin Dumont, Vincent Leemans, Marie-France Destain
2013 Precision Agriculture  
The interest of assimilating measurements in a crop model allows accurate prediction of LAI and soil water content at a local scale.  ...  LAI of winter wheat (Triticum aestivum L.) and soil water content of the topsoil (200 mm) and of the subsoil (500 mm) were considered as state variables of a dynamic soil-crop system.  ...  Figure 2 .Figure 3 .Figure 4 . 234 Estimation of LAI, HUR1, HUR2 using EKF. Estimation of LAI, HUR1, HUR2 using PF. Estimation of LAI, HUR1, HUR2 using VF.  ... 
doi:10.1007/s11119-013-9332-7 fatcat:z2tzu3zrnrem7bpqwdpc7beile

Reply

Vincent Wai-Sun Wong, Grace Lai-Hung Wong, Henry Lik-Yuen Chan
2016 Hepatology  
of ischemia is important when considering coronary intervention, and the presence of ischemia is associated with poor cardiovascular outcomes. (2) (3) (4) Previous randomized controlled trials in patients with stable coronary artery disease, comparing PCI with medical therapy without assessing the presence of ischemia, have shown no differences in composite death and myocardial infarction or in mortality alone. (3, 4) Recently, Gada et al. (5) reviewed three randomized controlled trials that
more » ... pared optimal medical therapy and PCI in stable coronary artery patients with objective ischemia, including noninvasive stress imaging or abnormal fractional flow reserve, enrolling a total of 1,557 patients followed for an average of 3.0 years. They showed that PCI was associated with lower mortality in patients with ischemia. Gada et al. had no data on ischemia detected by noninvasive stress imaging or abnormal fractional flow reserve. Therefore, NAFLD patients may be overestimated or underestimated regarding coronary intervention, which might affect cardiovascular outcomes. The presence of ischemia should be considered when performing clinical outcome studies using coronary angiography and PCI in NAFLD patients. ZH, et al. Long-term clinical outcomes after fatty liver screening in patients undergoing coronary angiography: a prospective cohort study. HEPATOLOGY 2016;63:754-763. 2) Deedwania PC. Does myocardial ischemia portend poor prognosis? J Am Coll Cardiol 1994;23:229-232. 3) Boden WE, O'Rourke RA, Teo KK, Hartigan PM, Maron DJ, Kostuk WJ, et al. Optimal medical therapy with or without PCI for stable coronary disease. N Engl J Med 2007;356:1503-1516. 4) Frye RL, August P, Brooks MM, Hardison RM, Kelsey SF, MacGregor JM, et al. A randomized trial of therapies for type 2 diabetes and coronary artery disease. N Engl J Med 2009;360:2503-2515. 5) Gada H, Kirtane AJ, Kereiakes DJ, Bangalore S, Moses JW, Genereux P, et al. Meta-analysis of trials on mortality after percutaneous coronary intervention compared with medical therapy in patients with stable coronary heart disease and objective evidence of myocardial ischemia. Am
doi:10.1002/hep.28595 pmid:27060860 fatcat:jujph5fy2vdizapmszxafudxby

Reply

Grace Lai-Hung Wong, Henry Lik-Yuen Chan, Vincent Wai-Sun Wong
2014 Hepatology  
Department of Medical Research Digestive Center E-DA Hospital Kaohsiung, Taiwan , 10 GRACE 10 LAI-HUNG WONG, M.D. 1,2,3 HENRY LIK-YUEN CHAN, M.D. 1,2,3 VINCENT WAI-SUN WONG, M.D. 1,2,3 1 Institute of  ... 
doi:10.1002/hep.27072 pmid:24700304 fatcat:cnldilqbxfbg5gj2lyhuuzv6wa

Rateless Coding for MIMO Block Fading Channels [article]

Yijia Fan, Lifeng Lai, Elza Erkip, H. Vincent Poor
2008 arXiv   pre-print
In this paper the performance limits and design principles of rateless codes over fading channels are studied. The diversity-multiplexing tradeoff (DMT) is used to analyze the system performance for all possible transmission rates. It is revealed from the analysis that the design of such rateless codes follows the design principle of approximately universal codes for parallel multiple-input multiple-output (MIMO) channels, in which each sub-channel is a MIMO channel. More specifically, it is
more » ... wn that for a single-input single-output (SISO) channel, the previously developed permutation codes of unit length for parallel channels having rate LR can be transformed directly into rateless codes of length L having multiple rate levels (R, 2R, . . ., LR), to achieve the DMT performance limit.
arXiv:0804.4662v1 fatcat:3c46ickht5dalbqaqtnindvnou

Intraorganizational communication with intranets

Vincent S. Lai
2001 Communications of the ACM  
Vincent S. Lai technology is an open system with major implications for an organization's IT infrastructure, including strategic business effects.  ... 
doi:10.1145/379300.379324 fatcat:gjuymp5d3zccrcgbmjiadtddh4

Cognitive Medium Access: Exploration, Exploitation and Competition [article]

Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor
2007 arXiv   pre-print
This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands in the spectrum with multiple bands is considered. In this scenario, the availability probability of each channel is unknown to the cognitive user a priori. Hence efficient medium access strategies must strike a balance between exploring the
more » ... lity of other free channels and exploiting the opportunities identified thus far. By adopting a Bayesian approach for this classical bandit problem, the optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of the optimal strategy, a low complexity asymptotically optimal strategy is developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike the optimal balance between exploration and exploitation in such competitive environments, are developed. Finally, this formalism is extended to the case in which each cognitive user is capable of sensing and using multiple channels simultaneously.
arXiv:0710.1385v1 fatcat:chsrmwdz65a3fi6f327ycred5u

Laying Performance, Survival Rate, Egg Quality and Shell Characteristics in Laying Pullets Offered Honey in Drinking Water during Hot Season

Monsuru Oladimeji Abioja, Maryam Oluwakemi Adekunle, John Adesanya Abiona, Olubunmi Grace Sodipe, Adebayo Vincent Jegede
2016 Agricultura tropica et subtropica  
To ensure improvement in egg production and egg shell thickness in laying pullets during hot season, honey at 20 ml/L water can be offered for 4 weeks.  ...  Egg production, survival, egg quality and shell characteristics in laying pullets offered honey in drinking water during hot season were determined using hens (28-week-old, n = 120) allotted to either  ...  Overall ST showed a significant effect of honey in laying pullets.  ... 
doi:10.1515/ats-2016-0002 fatcat:2khdixvhrzfqradatyyfryfzim

Secrecy Capacity of the Wiretap Channel with Noisy Feedback [article]

Lifeng Lai, Hesham El Gamal, H. Vincent Poor
2007 arXiv   pre-print
In this work, the role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is investigated. A model is considered in which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that a judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the
more » ... tapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. Then a half-duplex system is considered, for which a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source.
arXiv:0710.0865v1 fatcat:ibe274ld5bbsfbuomtlmlonc3a

Optimal Medium Access Protocols for Cognitive Radio Networks [article]

Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor
2008 arXiv   pre-print
This paper focuses on the design of medium access control protocols for cognitive radio networks. The scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum having multiple bands is first considered. In this scenario, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring (learning)
more » ... e availability probability of the channels and exploiting the knowledge of the availability probability identified thus far. For this scenario, an optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is developed. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike an optimal balance between exploration and exploitation in such competitive environments, are developed.
arXiv:0802.2703v1 fatcat:ytq6gmmdzzeuffhyl3pmu2pymm
« Previous Showing results 1 — 15 out of 57,598 results