1,715 research outputs found

    A Case Report of Congenital Bronchobiliary Fistula in Adults

    Get PDF

    The Influence of Boundary Spanning Capability on Cultural Differences--Multi-case Study fromVendors’Perspective

    Get PDF
    Most offshore IS outsourcing projects were failed. Communication and coordination problems caused by cultural differences between clients and vendors are important reasons. The theory of boundary spanning capability provides a new theoretical perspective for research of coordination and communication mechanisms between clients and vendors. In this paper, we chose three vendors focused on software testing to investigate the influence of boundary spanning capability on cultural differences. We found that high boundary spanning capability can reduce the influence of cultural differences, and improve the succes

    Bis(2,6-dihy­droxy­benzoato-κ2 O 1,O 1′)(nitrato-κ2 O,O′)bis­(1,10-phenanthroline-κ2 N,N′)dysprosium(III)

    Get PDF
    In the mononuclear title complex, [Dy(C7H5O4)2(NO3)(C12H8N2)2], the DyIII atom is in a distorted bicapped square-anti­prismatic geometry formed by four N atoms from two chelating 1,10-phenanthroline (phen) ligands, four O atoms from two 2,6-dihy­droxy­benzoate (DHB) ligands and two O atoms from a nitrate anion. Inter­molecular π–π stacking inter­actions between the phen and DHB ligands [centroid–centroid distances = 3.542 (4) and 3.879 (4) Å] and between the pyridine and benzene rings of adjacent phen ligands [centroid–centroid distance = 3.751 (4) Å] stabilize the crystal structure. Intra­molecular O–H⋯O hydrogen bonds are observed in the DHB ligands

    Hidden Tree Structure is a Key to the Emergence of Scaling in the World Wide Web

    Full text link
    Preferential attachment is the most popular explanation for the emergence of scaling behavior in the World Wide Web, but this explanation has been challenged by the global information hypothesis, the existence of linear preference and the emergence of new big internet companies in the real world. We notice that most websites have an obvious feature that their pages are organized as a tree (namely hidden tree) and hence propose a new model that introduces a hidden tree structure into the Erd\H{o}s-R\'e}yi model by adding a new rule: when one node connects to another, it should also connect to all nodes in the path between these two nodes in the hidden tree. The experimental results show that the degree distribution of the generated graphs would obey power law distributions and have variable high clustering coefficients and variable small average lengths of shortest paths. The proposed model provides an alternative explanation to the emergence of scaling in the World Wide Web without the above-mentioned difficulties, and also explains the "preferential attachment" phenomenon.Comment: 4 Pages, 7 Figure

    The research progress on the mechanism of adenosine A1 receptor-mediated calcitonin gene-related peptide to relieve migraine

    Get PDF
    Currently, the pathogenesis of migraine is unclear. The trigeminal vascular reflex theory is the dominant pathogenesis theory, and its core parts are neurogenic inflammation and pain sensitisation. Calcitonin gene related peptide (CGRP) is the most powerful vasodilating peptide in brain circulation. It is also a marker of trigeminal nerve microvascular activation that plays a synergistic role in the pathogenesis of migraine. Adenosine A1 receptor (A1R) can inhibit the release of CGRP in the trigeminal nerve vascular system to alleviate migraine by mediating adenosine. This review summarises the progress of research on the alleviation of migraine by using A1R-mediated CGRP

    A numerically stable fragile watermarking scheme for authenticating 3D models

    Get PDF
    International audienceThis paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile watermarking scheme. The scheme views the mantissa part of the floating-point number as an unsigned integer and operates on it by the bit XOR operator. Since there is no numerical problem in the bit operation, this scheme is numerically stable. The scheme can control the watermark strength through changing the embedding parameters. This paper further discusses selecting appropriate embedding parameters to achieve good performance in terms of the perceptual invisibility and the ability to detect unauthorized attacks on the 3D models. The experimental results show that the proposed public scheme could detect attacks such as adding noise, adding/deleting faces, inserting/removing vertices, etc. The comparisons with the existing fragile schemes show that this scheme is easier to implement and use
    • …
    corecore