A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Forging a New Space for Lay Male Piety: St. Vincent de Paul Societies in Urban Quebec and Ontario, 1846–1890
2009
Histoire sociale / Social History
Vincent de Paul. ...
Vincent de Paul, Toronto. ...
doi:10.1353/his.0.0055
fatcat:v7mnpuc7mjehlj2dhum66vs6iq
Laying foundation stones
1941
Notes and Queries
Sr, Vincent TROUBRIDGE.
ERLIN AND THE “MERLIN CHAIR.”’ ...
doi:10.1093/nq/180.21.372a
fatcat:p4ojnbszf5etre3im7ex5at4wa
Lay Theories of Essentialism
2006
Group Processes & Intergroup Relations
We argue that lay perceptions of social categories vary along three dimensions: natural kind-ness, entitativity, and essentialism. ...
Forced and chosen social categories Recently, Lickel and colleagues (2000) proposed to investigate lay theories people hold about groups in their environment and found that lay perceivers have intuitive ...
Demoulin et al. lay theories of essentialism
37 To summarize, essentialism refers to lay people's belief that, although group members may differ from one another at the surface level, group members very ...
doi:10.1177/1368430206059856
fatcat:bon5gnezerhqdovyoafxpqq2t4
Authentication over Noisy Channels
[article]
2008
arXiv
pre-print
In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios,
arXiv:0802.2701v1
fatcat:nxn46rxdo5bkhhra7mr3knez7m
more »
... wer and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.
Genetic improvement of laying hens viability using survival analysis
2000
Genetics Selection Evolution
The survival of about eight generations of a large strain of laying hens was analysed separating the rearing period (RP) from the production period (PP), after hens were housed. ...
1.7% at 300 days for PP), suggesting that selection based on solutions from the frailty models could be efficient, despite the very large proportion of censored records. survival analysis / viability / laying ...
Genetic evaluation and selection Selection of this strain of laying hens did not include any viability trait during the studied period. ...
doi:10.1051/gse:2000104
pmid:14736405
pmcid:PMC2706858
fatcat:7s3y4ju2z5cotfuigvlbfgomoy
Genetic improvement of laying hens viability using survival analysis
2000
Genetics Selection Evolution
The survival of about eight generations of a large strain of laying hens was analysed separating the rearing period (RP) from the production period (PP), after hens were housed. ...
1.7% at 300 days for PP), suggesting that selection based on solutions from the frailty models could be efficient, despite the very large proportion of censored records. survival analysis / viability / laying ...
Genetic evaluation and selection Selection of this strain of laying hens did not include any viability trait during the studied period. ...
doi:10.1186/1297-9686-32-1-23
fatcat:gu3vbmwjdnhavpp42j2arhc54u
Bayesian methods for predicting LAI and soil water content
2013
Precision Agriculture
The interest of assimilating measurements in a crop model allows accurate prediction of LAI and soil water content at a local scale. ...
LAI of winter wheat (Triticum aestivum L.) and soil water content of the topsoil (200 mm) and of the subsoil (500 mm) were considered as state variables of a dynamic soil-crop system. ...
Figure 2 .Figure 3 .Figure 4 . 234 Estimation of LAI, HUR1, HUR2 using EKF. Estimation of LAI, HUR1, HUR2 using PF. Estimation of LAI, HUR1, HUR2 using VF. ...
doi:10.1007/s11119-013-9332-7
fatcat:z2tzu3zrnrem7bpqwdpc7beile
Reply
2016
Hepatology
of ischemia is important when considering coronary intervention, and the presence of ischemia is associated with poor cardiovascular outcomes. (2) (3) (4) Previous randomized controlled trials in patients with stable coronary artery disease, comparing PCI with medical therapy without assessing the presence of ischemia, have shown no differences in composite death and myocardial infarction or in mortality alone. (3, 4) Recently, Gada et al. (5) reviewed three randomized controlled trials that
doi:10.1002/hep.28595
pmid:27060860
fatcat:jujph5fy2vdizapmszxafudxby
more »
... pared optimal medical therapy and PCI in stable coronary artery patients with objective ischemia, including noninvasive stress imaging or abnormal fractional flow reserve, enrolling a total of 1,557 patients followed for an average of 3.0 years. They showed that PCI was associated with lower mortality in patients with ischemia. Gada et al. had no data on ischemia detected by noninvasive stress imaging or abnormal fractional flow reserve. Therefore, NAFLD patients may be overestimated or underestimated regarding coronary intervention, which might affect cardiovascular outcomes. The presence of ischemia should be considered when performing clinical outcome studies using coronary angiography and PCI in NAFLD patients. ZH, et al. Long-term clinical outcomes after fatty liver screening in patients undergoing coronary angiography: a prospective cohort study. HEPATOLOGY 2016;63:754-763. 2) Deedwania PC. Does myocardial ischemia portend poor prognosis? J Am Coll Cardiol 1994;23:229-232. 3) Boden WE, O'Rourke RA, Teo KK, Hartigan PM, Maron DJ, Kostuk WJ, et al. Optimal medical therapy with or without PCI for stable coronary disease. N Engl J Med 2007;356:1503-1516. 4) Frye RL, August P, Brooks MM, Hardison RM, Kelsey SF, MacGregor JM, et al. A randomized trial of therapies for type 2 diabetes and coronary artery disease. N Engl J Med 2009;360:2503-2515. 5) Gada H, Kirtane AJ, Kereiakes DJ, Bangalore S, Moses JW, Genereux P, et al. Meta-analysis of trials on mortality after percutaneous coronary intervention compared with medical therapy in patients with stable coronary heart disease and objective evidence of myocardial ischemia. Am
Reply
2014
Hepatology
Department of Medical Research Digestive Center E-DA Hospital Kaohsiung, Taiwan
, 10 GRACE 10 LAI-HUNG WONG, M.D. 1,2,3 HENRY LIK-YUEN CHAN, M.D. 1,2,3 VINCENT WAI-SUN WONG, M.D. 1,2,3 1 Institute of ...
doi:10.1002/hep.27072
pmid:24700304
fatcat:cnldilqbxfbg5gj2lyhuuzv6wa
Rateless Coding for MIMO Block Fading Channels
[article]
2008
arXiv
pre-print
In this paper the performance limits and design principles of rateless codes over fading channels are studied. The diversity-multiplexing tradeoff (DMT) is used to analyze the system performance for all possible transmission rates. It is revealed from the analysis that the design of such rateless codes follows the design principle of approximately universal codes for parallel multiple-input multiple-output (MIMO) channels, in which each sub-channel is a MIMO channel. More specifically, it is
arXiv:0804.4662v1
fatcat:3c46ickht5dalbqaqtnindvnou
more »
... wn that for a single-input single-output (SISO) channel, the previously developed permutation codes of unit length for parallel channels having rate LR can be transformed directly into rateless codes of length L having multiple rate levels (R, 2R, . . ., LR), to achieve the DMT performance limit.
Intraorganizational communication with intranets
2001
Communications of the ACM
Vincent S. Lai technology is an open system with major implications for an organization's IT infrastructure, including strategic business effects. ...
doi:10.1145/379300.379324
fatcat:gjuymp5d3zccrcgbmjiadtddh4
Cognitive Medium Access: Exploration, Exploitation and Competition
[article]
2007
arXiv
pre-print
This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands in the spectrum with multiple bands is considered. In this scenario, the availability probability of each channel is unknown to the cognitive user a priori. Hence efficient medium access strategies must strike a balance between exploring the
arXiv:0710.1385v1
fatcat:chsrmwdz65a3fi6f327ycred5u
more »
... lity of other free channels and exploiting the opportunities identified thus far. By adopting a Bayesian approach for this classical bandit problem, the optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of the optimal strategy, a low complexity asymptotically optimal strategy is developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike the optimal balance between exploration and exploitation in such competitive environments, are developed. Finally, this formalism is extended to the case in which each cognitive user is capable of sensing and using multiple channels simultaneously.
Laying Performance, Survival Rate, Egg Quality and Shell Characteristics in Laying Pullets Offered Honey in Drinking Water during Hot Season
2016
Agricultura tropica et subtropica
To ensure improvement in egg production and egg shell thickness in laying pullets during hot season, honey at 20 ml/L water can be offered for 4 weeks. ...
Egg production, survival, egg quality and shell characteristics in laying pullets offered honey in drinking water during hot season were determined using hens (28-week-old, n = 120) allotted to either ...
Overall ST showed a significant effect of honey in laying pullets. ...
doi:10.1515/ats-2016-0002
fatcat:2khdixvhrzfqradatyyfryfzim
Secrecy Capacity of the Wiretap Channel with Noisy Feedback
[article]
2007
arXiv
pre-print
In this work, the role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is investigated. A model is considered in which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that a judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the
arXiv:0710.0865v1
fatcat:ibe274ld5bbsfbuomtlmlonc3a
more »
... tapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. Then a half-duplex system is considered, for which a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source.
Optimal Medium Access Protocols for Cognitive Radio Networks
[article]
2008
arXiv
pre-print
This paper focuses on the design of medium access control protocols for cognitive radio networks. The scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum having multiple bands is first considered. In this scenario, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring (learning)
arXiv:0802.2703v1
fatcat:ytq6gmmdzzeuffhyl3pmu2pymm
more »
... e availability probability of the channels and exploiting the knowledge of the availability probability identified thus far. For this scenario, an optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is developed. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike an optimal balance between exploration and exploitation in such competitive environments, are developed.
« Previous
Showing results 1 — 15 out of 57,598 results