Showing 301 - 320 results of 5,531 for search '"fasting"', query time: 0.06s Refine Results
  1. 301

    Low‐rank and sparse reconstruction for fast diffusion nuclear magnetic resonance spectroscopy by Di Guo, Jiaying Zhan, Yirong Zhou, Zhangren Tu, Zifei Zhang, Zhong Chen, Xiaobo Qu

    Published 2021-04-01
    “…The authors introduce the low‐rank constraint as an effective remedy to remove these artefacts and derive a fast algorithm to solve the reconstruction problem. …”
    Get full text
    Article
  2. 302
  3. 303
  4. 304
  5. 305
  6. 306

    Maximizing Information Dissemination in Social Network via a Fast Local Search by Lijia Tian, Xingjian Ji, Yupeng Zhou

    Published 2025-01-01
    “…To tackle this complex NP-hard optimization problem, a rapid local search algorithm named FastIM is introduced. A fast constructive heuristic is initially used to quickly find a starting solution, while a sampling selection method is incorporated to minimize complexity during the local search. …”
    Get full text
    Article
  7. 307

    A Method for Fast Leaderboard Calculations in Massive Online Game-Based Environments by Julian Moreno Cadavid, Hernán Darío Vanegas Madrigal

    Published 2018-01-01
    “…It is based on two particular data structures, a Self-Balanced Ordering Statistic Tree and a hash table, to perform proper leaderboard calculations in a fast and cheap way. More specifically, our proposal has O(log2⁡N) time complexity, whereas other approaches also based on in-memory data structures like linked lists have O(N), and others based on Hard Disk Drive operations like a relational database have O(Nlog2⁡N). …”
    Get full text
    Article
  8. 308

    A Method for Fast Generating the VIE-MoM Matrix with the SWG Functions by Shu-Wen Chen, Hou-Xing Zhou, Wei-Dong Li, Guang Hua, Wei Hong

    Published 2013-01-01
    “…A method for fast generating the VIE-MoM matrix with the SWG functions is proposed. …”
    Get full text
    Article
  9. 309
  10. 310
  11. 311
  12. 312
  13. 313

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  14. 314

    Fast and Deterministic Underwater Point Cloud Registration for Multibeam Echo Sounder Data by Liang Zhao, Lan Cheng, Tingfeng Tan, Chun Cao, Feihu Zhang

    Published 2024-12-01
    “…This paper presents a fast, deterministic Branch-and-Bound (BnB) method with four degrees of freedom, which combines Inertial Measurement Unit (IMU) data with MBES point cloud data for precise registration. …”
    Get full text
    Article
  15. 315
  16. 316
  17. 317

    Non-canonical lysosomal lipolysis drives mobilization of adipose tissue energy stores with fasting by GV Naveen Kumar, Rui-Sheng Wang, Ankit X. Sharma, Natalie L. David, Tânia Amorim, Daniel S. Sinden, Nandini K. Doshi, Martin Wabitsch, Sebastien Gingras, Asim Ejaz, J. Peter Rubin, Bradley A. Maron, Pouneh K. Fazeli, Matthew L. Steinhauser

    Published 2025-02-01
    “…Our study establishes a model whereby the canonical pathway is critical for rapid lipolytic responses to adrenergic stimuli operative in the acute stage of fasting, while the alternative lysosomal pathway dominates with prolonged fasting.…”
    Get full text
    Article
  18. 318
  19. 319

    The adult table: Chronic intermittent fasting improves β cell health only in adults by Kathrin Maedler, Heena Pahwa

    Published 2025-02-01
    “…Intermittent fasting (IF) improves metabolic health in some individuals but increases health risks in others. …”
    Get full text
    Article
  20. 320