Search results for "IONT"

showing 10 items of 382 documents

Sumatriptan Succinate Transdermal Delivery Systems for The Treatment of Migraine

2007

We have successfully obtained sumatriptan transdermal systems with different polymer compositions: methyl cellulose (MC), polyvinyl pyrrolidone (PVP) and a polyvinyl pyrrolidone (PVP)-polyvinyl alcohol (PVA) mixture. The systems contained 1,2-propylenglycol (MC) or sorbitol as a plasticizer (PVP and PVP-PVA), methacrylate copolymer as an adhesive agent, and an occlusive liner. Azone (5%, w/w) was incorporated into all the systems as a percutaneous enhancer. Transdermal systems are thin, transparent and non-adhesive when in a dry state. The permeation of sumatriptan succinate across pig ear skin was studied using the systems prepared. The formulation with MC polymer produced a statistically …

PolymersSwineChemistry PharmaceuticalDrug CompoundingMigraine DisordersSkin AbsorptionPharmaceutical Sciencemacromolecular substancesAbsorption (skin)MethylcellulosePharmacologyAdministration CutaneousPermeabilityDosage formchemistry.chemical_compoundPolymethacrylic AcidsPlasticizersSumatriptan SuccinatemedicineAnimalsSorbitolTechnology PharmaceuticalVasoconstrictor AgentsSkinTransdermalDrug Carriersintegumentary systemSumatriptanChemistrytechnology industry and agriculturePlasticizerPovidoneAzepinesIontophoresisPermeationPropylene GlycolSerotonin Receptor AgonistsKineticsSumatriptanPolyvinyl AlcoholMethyl celluloseDiffusion Chambers CultureTissue AdhesivesNuclear chemistrymedicine.drugJournal of Pharmaceutical Sciences
researchProduct

Non-linear Local Polynomial Regression Multiresolution Methods Using $$\ell ^1$$-norm Minimization with Application to Signal Processing

2015

Harten’s Multiresolution has been developed and used for different applications such as fast algorithms for solving linear equations or compression, denoising and inpainting signals. These schemes are based on two principal operators: decimation and prediction. The goal of this paper is to construct an accurate prediction operator that approximates the real values of the signal by a polynomial and estimates the error using \(\ell ^1\)-norm in each point. The result is a non-linear multiresolution method. The order of the operator is calculated. The stability of the schemes is ensured by using a special error control technique. Some numerical tests are performed comparing the new method with…

Polynomial regressionDecimationMathematical optimizationSignal processingPolynomialOperator (computer programming)Computer scienceCompression (functional analysis)InpaintingData_CODINGANDINFORMATIONTHEORYAlgorithmLinear equation
researchProduct

Diagonal space time hadamard codes with erasure decoding algorithm

2005

A major challenge in the area of space time (ST) codes is to find codes suitable for efficient decoding, thus overcoming the problem of many existing ST code designs which require maximum-likelihood (ML) decoding. A solution could be to apply single-input single-output (SISO) channel codes and theory over temporal channel fading to the multi-input single-output (MISO) code construction and classical suboptimum decoding methods. For these purposes, an ST code construction which allows the use of efficient decoding algorithms is described. We propose a concatenated code, where the inner code is the diagonal ST Hadamard (D-STH) code with Paley constructions and the outer code is an algebraic b…

Prefix codeBlock codePolynomial codeComputer scienceConcatenationList decodingData_CODINGANDINFORMATIONTHEORYSequential decodingLocally testable codeSystematic codeReed–Solomon error correctionHadamard transformCyclic codeFadingLow-density parity-check codeComputer Science::Information TheorySelf-synchronizing codeHadamard codeConcatenated error correction codeReed–Muller codeSerial concatenated convolutional codesAntenna diversityLinear codeConvolutional codeErasureConstant-weight codeErasure codeAlgorithmDecoding methodsCommunication channelIEEE Wireless Communications and Networking Conference, 2005
researchProduct

A Generalization of Girod's Bidirectional Decoding Method to Codes with a Finite Deciphering Delay

2012

Girod’s encoding method has been introduced in order to efficiently decode from both directions messages encoded by using finite prefix codes. In the present paper, we generalize this method to finite codes with a finite deciphering delay. In particular, we show that our decoding algorithm can be realized by a deterministic finite transducer. We also investigate some properties of the underlying unlabeled graph.

Prefix codeStrongly connected componentTheoretical computer scienceGeneralizationdeciphering delayData_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technology01 natural sciences[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]Encoding (memory)0202 electrical engineering electronic engineering information engineeringCode (cryptography)Computer Science (miscellaneous)prefix (free) codeunlabeled graphMathematicsCode[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]020206 networking & telecommunicationsCode; deciphering delay; prefix (free) code; strongly connected component; transducer; unlabeled graph; Computer Science (miscellaneous)Prefixtransducer[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]010201 computation theory & mathematicsGraph (abstract data type)strongly connected componentAlgorithmDecoding methods
researchProduct

Understanding unethical behaviors at the university level: a multiple regression analysis

2020

Unethical behaviors such as corruption pose an important challenge for students, professors, and other university members. We aimed to clarify students' willingness to engage in corruption in a Spanish public university. In all, 3,475 undergraduate, postgraduate, and PhD students completed an online questionnaire assessing four corruption scenarios: favoritism, bribery, fraud, and embezzlement. Multiple regression analysis suggested that justifiability, risk perception, and perceived corruption played a key role in explaining corrupt intention. Behavioral intention to engage in corruption is a complex phenomenon explained by not only peers' behaviors, but also individuals' justifications of…

Psicologia socialComputingMilieux_THECOMPUTINGPROFESSIONSocial PsychologyCorruptionmedia_common.quotation_subject05 social sciencesUniversity levelRegression analysisData_CODINGANDINFORMATIONTHEORY06 humanities and the arts0603 philosophy ethics and religionRisk perception0502 economics and businessComputingMilieux_COMPUTERSANDEDUCATIONComputingMilieux_COMPUTERSANDSOCIETY060301 applied ethicsPsychologySocial psychology050203 business & managementGeneral Psychologymedia_commonEthics & Behavior
researchProduct

Non-Gaussian entanglement swapping

2016

We investigate the continuous-variable entanglement swapping protocol in a non-Gaussian setting, with non- Gaussian states employed either as entangled inputs and/or as swapping resources. The quality of the swapping protocol is assessed in terms of the teleportation fidelity achievable when using the swapped states as shared entangled resources in a teleportation protocol. We thus introduce a two-step cascaded quantum communication scheme that includes a swapping protocol followed by a teleportation protocol. The swapping protocol is fed by a general class of tunable non-Gaussian states, the squeezed Bell states, which, by means of controllable free parameters, allows for a continuous morp…

Quantum PhysicsFOS: Physical sciencesData_CODINGANDINFORMATIONTHEORYQuantum PhysicsQuantum Physics (quant-ph)Optics (physics.optics)Physics - Optics
researchProduct

A search for new physics in dijet mass and angular distributions in pp collisions at [subscript √s=7] TeV measured with the ATLAS detector

2011

A search for new interactions and resonances produced in LHC proton–proton (pp) collisions at a centre-of-mass energy ps = 7 TeV was performed with the ATLAS detector. Using a dataset with an integrated luminosity of 36 pb−1, dijet mass and angular distributions were measured up to dijet masses of 3.5 TeV and were found to be in good agreement with Standard Model predictions. This analysis sets limits at 95% CL on various models for new physics: an excited quark is excluded for mass between 0.60 and 2.64 TeV, an axigluon hypothesis is excluded for axigluon masses between 0.60 and 2.10 TeV and quantum black holes are excluded in models with six extra space–time dimensions for quantum gravity…

QuarkParticle physicsChiral ColorCiências Naturais::Ciências FísicasPhysics beyond the Standard ModelAstrophysics::High Energy Astrophysical Phenomena:Ciências Físicas [Ciências Naturais]General Physics and AstronomyFOS: Physical sciencesddc:500.2dijet; mass; pp collisionts; ATLAS detector5307. Clean energy01 natural sciencesStandard ModelHigh Energy Physics - ExperimentNuclear physicsHigh Energy Physics - Experiment (hep-ex)Atlas (anatomy)Chiral color0103 physical sciencesmedicine[PHYS.HEXP]Physics [physics]/High Energy Physics - Experiment [hep-ex]String resonance010306 general physicsPhysicsQuantum chromodynamicsLarge Hadron ColliderScience & Technology010308 nuclear & particles physicsParton DistributionsSettore FIS/01 - Fisica SperimentaleHigh Energy Physics::PhenomenologyFísicaHadron CollidersQCDmedicine.anatomical_structureExperimental High Energy Physicsddc:540ComputingMethodologies_DOCUMENTANDTEXTPROCESSINGQuarkFísica nuclearHigh Energy Physics::ExperimentParticle Physics - Experiment
researchProduct

A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks

2011

This paper proposes a TDMA-based medium access control protocol which enables cooperative communications in multi-hop wireless mesh networks. According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated manner, controlled by mini-slots which are part of the time slot. Benefiting from the elaborate mini-slot design, channel resources are fairly and efficiently allocated to each router so that no handshake is needed prior to each packet transmission. By providing access priority to cooperative transmission through an optimal relay which is determined b…

RouterHandshakeWireless mesh networkComputer Networks and Communicationsbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessAccess controlData_CODINGANDINFORMATIONTHEORYlaw.inventionHardware and ArchitectureRelaylawbusinessRelay channelComputer networkInternational journal of Computer Networks & Communications
researchProduct

A mini-slot-based cooperative MAC protocol for wireless mesh networks

2010

This paper proposes a TDMA-based medium access control protocol with cooperative communications enabled in wireless mesh networks. The proposed scheme is based on a multi-hop scenario which is extended from the conventional one-hop triangle cooperative transmission scenario. Benefiting from the elaborate mini-slot design, channel resources are fairly and efficiently allocated to each router so that no handshake is needed prior to every packet transmission. By giving priority for channel access to cooperative transmission performed by an optimal helper which is determined based on the received SNR, higher successful transmission rate can be achieved. Numerical results demonstrate that the pr…

Routing protocolRouterChannel allocation schemesWireless mesh networkbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessThroughputData_CODINGANDINFORMATIONTHEORYComputer Science::PerformanceTransmission (telecommunications)Computer Science::Networking and Internet ArchitectureWirelessbusinessComputer networkCommunication channel2010 IEEE Globecom Workshops
researchProduct

Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes

2010

Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets when higher end-to-end throughput can be achieved compared with the direct transmission, the cooperative retransmission schemes use relays to retransmit data only after the direct transmission fails. However, the performance of the these different approaches has not been compared in the literature, especially when energy efficiency is considered. In order to find out the best transmission scheme, this paper evaluates and compares the performance of the one-hop direct transm…

Routing protocolbusiness.industryNetwork packetWireless networkComputer scienceRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionComputer Science::PerformanceRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessComputer Science::Information TheoryComputer networkEfficient energy use2010 European Wireless Conference (EW)
researchProduct