期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A New Technique for Attention Management and Somatosensory Processing in Hypnotherapy: Mental Access/Somatosensory Access (MASSA)
1
作者 Eitan G. Abramowitz 《Open Journal of Medical Psychology》 2023年第4期192-230,共39页
The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a ... The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a Bottom-Up/Top-Down Paradigm, which complements and mutually reinforces hypnotic inductions by using imbedded suggestions. The intervention’s algorithm includes a combination of real-time stimulation through one of the following somatosensory modalities: sensorimotor activation of the palms, visual, auditory, vibration, thermal, olfaction or oropharyngeal. These modalities are accompanied by guided hypnotic dissociation and suggestions. Somatosensory stimulation amplifies patients’ engagement in the procedure, focusing their attention on a stimulus and on the hypnotic experience during the intervention. A stream of closed questions with imbedded suggestions, presented by the therapist, is designed using suggestive presuppositions, termed by the author “The Create and Verify Principle” (CVP). This principle facilitates effective pacing and helps transform patients’ sensory and mental experiences. Imbedded suggestions followed by real-time stimulation, maintain a focus on the somatosensory content, boost the hypnotic experience, and gradually combine awareness of the somatosensory stimulation experience (Bottom-Up regulation) with memory, imagination, emotions and meanings, for mental access of resources and adaptive coping (Top-Down regulation). In the first part of this article, the author briefly introduces the neurophysiological mechanism behind the suggestive, somatosensory, attention-management intervention and provides an example of a basic algorithm of the MASSA technique. The second part includes clinical samples with scripts of successfully treated patients, who experienced tension headache, psychogenic balance disorder, tinnitus. . 展开更多
关键词 ATTENTION Somatosensory Stimulation Imbedded Suggestions Create and Verify Principle Mental access/Somatosensory access (MASSA) HYPNOSIS
在线阅读 下载PDF
OPTIMIZATION OF SPECTRUM UTILIZATION IN COGNITIVE RADIO SYSTEM
2
作者 Li Hongjiang Zhu Qi 《Journal of Electronics(China)》 2011年第4期450-459,共10页
In Cognitive Radio(CR) networks,CR user has to detect the spectrum channel periodically to make sure that the channel is idle during data transmission frame in order to avoid the collisions to the primary users.Hence ... In Cognitive Radio(CR) networks,CR user has to detect the spectrum channel periodically to make sure that the channel is idle during data transmission frame in order to avoid the collisions to the primary users.Hence recent research has been focused on the interference avoidance problem.Quality of Service(QoS) requirement of CR user will affect the time of data transmission in each frame.In this paper,in order to solve the interference avoidance and spectrum utilization problems without cooperation among CR users,a new scheme to obtain the optimal duration of data transmission frame is proposed to maximize the spectrum utilization and guarantee the protection to the primary users.The main advantages of our proposed scheme include the followings:(1) QoS requirement of CR user is concerned;(2) p-persistent Media Access Control(MAC) random access is used to avoid the collisions among CR users;(3) CR network system capacity is considered.We develop a Markov chain of the primary spectrum channel states and an exponential distribution of the CR user's traffic model to analyze the performance of our proposed scheme.Computer simulation shows that there is an optimal data transmission time to maximize the spectrum utilization.However,the regulatory constraint of the collision rate to the primary users has to be satisfied at the expense of spectrum utilization.And also the tradeoff between the spectrum utilization and the capacity of the CR system is taken into account. 展开更多
关键词 Cognitive Radio(CR) Collision rate Traffic model Media access Control(MAC) random access TRADEOFF
在线阅读 下载PDF
System Architecture of Godson-3 Multi-Core Processors 被引量:7
3
作者 高翔 陈云霁 +2 位作者 王焕东 唐丹 胡伟武 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期181-191,共11页
Godson-3 is the latest generation of Godson microprocessor family. It takes a scalable multi-core architecture with hardware support for accelerating applications including X86 emulation and signal processing. This pa... Godson-3 is the latest generation of Godson microprocessor family. It takes a scalable multi-core architecture with hardware support for accelerating applications including X86 emulation and signal processing. This paper introduces the system architecture of Godson-3 from various aspects including system scalability, organization of memory hierarchy, network-on-chip, inter-chip connection and I/O subsystem. 展开更多
关键词 multi-core processor scalable interconnection cache coherent non-uniform memory access/non-uniform cache access (CC-NUMA/NUCA) MESH CROSSBAR cache coherence reliability availability and serviceability (RAS)
原文传递
Analysis of Classical Encryption Techniques in Cloud Computing 被引量:1
4
作者 Muhammad Yasir Shabir Asif Iqbal +1 位作者 Zahid Mahmood Ata Ullah Ghafoor 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期102-113,共12页
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pa... Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications. 展开更多
关键词 cloud computing access control fine-grained access weighted attribute
原文传递
Fairness optimization and power allocation in cognitive NOMA/OMA V2V network with imperfect SIC
5
作者 Liang Xiaolin Liu Qianlong +3 位作者 Cao Wangbin Liu Shuaiqi Zhao Shuhuan Zhao Xiongwen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第6期68-81,共14页
In order to improve the reliability and resource utilization efficiency of vehicle-to-vehicle(V2V)communication system,in this paper,the fairness optimization and power allocation for the cognitive V2V network that ta... In order to improve the reliability and resource utilization efficiency of vehicle-to-vehicle(V2V)communication system,in this paper,the fairness optimization and power allocation for the cognitive V2V network that takes into account the realistic three-dimensional(3D)channel are investigated.Large-scale and small-scale fading are considered in the proposed channel model.An adaptive non-orthogonal multiple access(NOMA)/orthogonal multiple access(OMA)scheme is proposed to reduce the complexity of successive-interference-cancellation(SIC)in decoding and improve spectrum utilization.Also,a fairness index that takes into account each user's requirements is proposed to indicate the optimal point clearly.In the imperfect SIC,the optimization problem of maximizing user fairness is formulated.Then,a subgradient descent method is proposed to solve the optimization problem with customizable precision.And the computational complexity of the proposed method is analyzed.The achievable rate,outage probability and user fairness are analyzed.The results show that the proposed adaptive NOMA/OMA(A-NOMA/OMA)outperforms both NOMA and OMA.The simulation results are compared with validated analysis to confirm the theoretical analysis. 展开更多
关键词 sadaptive non-orthogonal multiple access(NOMA)/orthogonal multiple access(OMA) user fairness power allocation imperfect successive-interference-cancellation(SIC) vehicle-to-vehicle(V2V)communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部