Effectiveness of warm compress and cold compress to reduce laceration perineum pain on primiparous at Candimulyo Magelang 2015
نویسندگان
چکیده
منابع مشابه
To compress or not to compress ?
| For practical communications which transmit nite blocks of source data over noisy channels, we question the common practice to compress (C) the source and then to add redundancy for error control. Rather we exploit the redundancy of the non-compressed source (NC) at the channel decoder by source-controlled channel decoding. For a simple binary Markov source and a Rayleigh fading channel we si...
متن کاملThe Distinction of Hot Herbal Compress, Hot Compress, and Topical Diclofenac as Myofascial Pain Syndrome Treatment
This randomized controlled trial aimed to investigate the distinctness after treatment among hot herbal compress, hot compress, and topical diclofenac. The registrants were equally divided into groups and received the different treatments including hot herbal compress, hot compress, and topical diclofenac group, which served as the control group. After treatment courses, Visual Analog Scale and...
متن کاملCompress and Control
This paper describes a new information-theoretic policy evaluation technique for reinforcement learning. This technique converts any compression or density model into a corresponding estimate of value. Under appropriate stationarity and ergodicity conditions, we show that the use of a sufficiently powerful model gives rise to a consistent value function estimator. We also study the behavior of ...
متن کاملHash, Displace, and Compress
A hash function h, i.e., a function from the set U of all keys to the range range [m] = {0, . . . ,m− 1} is called a perfect hash function (PHF) for a subset S ⊆ U of size n ≤ m if h is 1–1 on S. The important performance parameters of a PHF are representation size, evaluation time and construction time. In this paper, we present an algorithm that permits to obtain PHFs with representation size...
متن کاملHow to Compress Asymmetric Communication
We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If I denotes the number of bits of information revealed by the first party, I denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that one can simulate the protocol using order I + 4 √ C3 · ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Medical Sciences
سال: 2015
ISSN: 2320-6071
DOI: 10.18203/2320-6012.ijrms20151516