Showing 43,081 - 43,100 results of 46,768 for search '"Design"', query time: 0.15s Refine Results
  1. 43081

    Understanding Logical-Shift Error Propagation in Quanvolutional Neural Networks by Marzio Vallero, Emanuele Dri, Edoardo Giusto, Bartolomeo Montrucchio, Paolo Rech

    Published 2024-01-01
    “…We characterize the error propagation in the quantum circuit implementing a single convolution and then in various designs of the same QNN, varying the dataset and the network depth. …”
    Get full text
    Article
  2. 43082

    To assess dietary habits and associated risk factors among medical students in North Delhi: A major health concern by Pooja Ahlawat, Archana Dwivedi, Nidhi Dwivedi, Gunjan Mahuar, Kamaljeet Singh, Mridul Mahaur, Soumit Sharma, Akshita Jain

    Published 2024-12-01
    “…Methods: A cross-sectional study using the complete enumeration sampling method was conducted on medical students of North Delhi Municipal Corporation Medical College and Hindu Rao Hospital. A pre-designed pre-tested semi-structured questionnaire was used to collect student data. …”
    Get full text
    Article
  3. 43083

    Key Technology Research on the Rapid-Molding In-Closed Retaining-Wall in Filling Mining by Chaowen Hu, Qian Li, Yilong Wang, Ke Chang, Yongyuan Li, Yaqian Wang, Hui Liu

    Published 2022-01-01
    “…Through theoretical analysis and engineering analogy, the overall structure and size of the mold bag were designed. Through the experiment of high-water bleeding rate and slurry expansion, it was determined that the best water-cement ratio was 0.85 : 1, and the best additive content was 25 kg/m3. …”
    Get full text
    Article
  4. 43084

    A privacy budget adaptive optimization scheme for federated computing power Internet of things by MA Wenyu, CHEN Qian, HU Yuxiang, YAN Haonan, HU Tao, YI Peng

    Published 2024-12-01
    “…Federated computing power Internet of things (IoT) is designed to deeply integrate computing power with IoT resources, facilitating the efficient utilization of vast and ubiquitously dispersed IoT data and heterogeneous resources through federated learning. …”
    Get full text
    Article
  5. 43085

    Developing an evaluation approach for the in-depth review of a new undergraduate medical programme as a complex system. by Detlef R Prozesky, Masego B Kebaetse, Mpho S Mogodi, Mmoloki C Molwantwa

    Published 2024-01-01
    “…<h4>Discussion</h4>In the process of designing and using the 'six-step process' to evaluate a complex medical programme important lessons were learnt: starting the process with complexity theory at the forefront; being as inclusive as possible in data collection; also applying complexity theory to the evaluation of smaller programme components as 'mini-complex systems'; and managing one's inevitable insider bias.…”
    Get full text
    Article
  6. 43086

    Does Vitamin D Level Affect the Radiographic Severity of Osteoarthritis Knee and its Functional Status? by S. Hariprasad, Aditya Seth, S. J. Karthik, Anish N. Tawde, Ratnakar Vecham, Adarsh Annapareddy, A. V. Gurava Reddy, Rajat Jain

    Published 2023-07-01
    “…Further research with larger sample sizes and longitudinal designs is necessary to establish a comprehensive understanding of the relationship between Vitamin D levels and knee OA severity.…”
    Get full text
    Article
  7. 43087

    Development and laboratory evaluation of a novel IoT-based electric-driven metering system for high precision garlic planter. by Abdallah Elshawadfy Elwakeel, Ahmed Elbeltagi, Ahmed Z Dewidar, Ali Salem, Mohamed Anwer Abdeen

    Published 2025-01-01
    “…The developed EDMS and GSMCS are technical manuals for developing and designing monitoring systems capable of precisely measuring and identifying the rates of qualifying and missing garlic seed measurements.…”
    Get full text
    Article
  8. 43088

    A metamodern model for managing stakeholder relationships in non-profit organisations by Irma Meyer, Rachel Barker

    Published 2022-10-01
    “…This entails adopting a micro-perspective by regularly identifying current strategic issues, mapping the stakeholders involved and linking them to these issues, and designing focused communication strategies to manage stakeholder relationships. …”
    Get full text
    Article
  9. 43089

    Exploring the inequalities experienced by health and care workforce and their bases - A scoping review protocol. by Roomi Aziz, Anuj Kapilashrami, Reza Majdzadeh

    Published 2024-01-01
    “…All types of published study designs in English language will be included if they discuss any inequality experienced by any category of health and care workers. …”
    Get full text
    Article
  10. 43090

    Dynamic Conjugate Gradient Unfolding for Symbol Detection in Time-Varying Massive MIMO by Toluwaleke Olutayo, Benoit Champagne

    Published 2024-01-01
    “…Secondly, we introduce an adaptation of PrLcgNet referred to as Dynamic Conjugate Gradient Network (DyCoGNet), specifically designed for time-varying environments. DyCoGNet leverages self-supervised learning with Forward Error Correction (FEC), enabling autonomous adaptation without the need for explicit labeled data. …”
    Get full text
    Article
  11. 43091

    App-Based Volleyball Scoreboard Performance Evaluation by Sholeh Agus Santoso, M. Haris Satria

    Published 2024-09-01
    “…This research aims to develop and evaluate an application-based volleyball scoreboard game device designed to facilitate the process of recording and managing scores in real time. …”
    Get full text
    Article
  12. 43092
  13. 43093

    Estimating the Torsional Capacity of Reinforced Concrete Beams Using ANFIS Models by Zhao Wenwu, Zeng Shaowu, Gong Guilin, Li Qiangqiang, Li Kexing

    Published 2024-09-01
    “…Designing or appraising framed concrete buildings exposed to high eccentric loads requires precise reinforced concrete (𝑅𝐶) torsional strength estimates. …”
    Get full text
    Article
  14. 43094

    Intrinsic assurance: a systematic approach towards extensible cybersecurity by Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG

    Published 2023-02-01
    “…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
    Get full text
    Article
  15. 43095

    Seasonal Influenza Vaccination Uptake Among Australian Healthcare Professionals: An Archetype for Success by Caroline M. Hall, Anthony Cotton, Adrian Webster, Mary Bushell, Holly L. Northam

    Published 2025-01-01
    “…Method: A cross-sectional survey was designed and distributed to an Australian HCP sample consisting of practicing nurses, midwives, pharmacists, and medical practitioners. …”
    Get full text
    Article
  16. 43096

    Structural Changes in Thin Keratoconic Corneas Following Crosslinking with Hypotonic Riboflavin: Findings on In Vivo Confocal Microscopy by Aalia Rasool Sufi, M. Soundaram, Nilam Gohil, Jeremy D. Keenan, N. Venkatesh Prajna

    Published 2021-07-01
    “…This case series was a preliminary feasibility study that might necessitate conducting a well-designed controlled study.…”
    Get full text
    Article
  17. 43097

    The Adsorption of Copper, Lead Metal Ions, and Methylene Blue Dye from Aqueous Solution by Pure and Treated Fennel Seeds by Ntandokazi Mabungela, Ntaote David Shooto, Fanyana Mtunzi, Eliazer Bobby Naidoo

    Published 2022-01-01
    “…Pure fennel seeds were labelled as PFS; nitric and sulphuric acid-treated seeds were designated as NAFS and SAFS, respectively. The adsorbents were characterised by SEM, EDX, FTIR, XRD, and BET. …”
    Get full text
    Article
  18. 43098

    Quand des pesticides empoisonnent la recherche, la réglementation et la démocratie : by Louise Vandelac

    Published 2021-05-01
    “…Never in the history of science has been published such a detailed account of the attacks and perfidious manipulations of an agribusiness giant to destroy the reputation and life of one of the most published scientists on its flagship product : Bayer-Monsanto's Roundup, the world's best-selling pesticide and a glyphosate-based herbicide used on GMOs designed to absorb it without dying, a key to agro-industrial concentration. …”
    Get full text
    Article
  19. 43099

    Adapting a style based generative adversarial network to create images depicting cleft lip deformity by Abdullah Hayajneh, Erchin Serpedin, Mohammad Shaqfeh, Graeme Glass, Mitchell A. Stotland

    Published 2025-01-01
    “…We have built a deep learning-based cleft lip generator called CleftGAN designed to produce an almost unlimited number of high-fidelity facsimiles of cleft lip facial images with wide variation. …”
    Get full text
    Article
  20. 43100

    MSCD-YOLO: A Lightweight Dense Pedestrian Detection Model with Finer-Grained Feature Information Interaction by Qiang Liu, Zhongmin Li, Lei Zhang, Jin Deng

    Published 2025-01-01
    “…In our model, the light-weight backbone network MobileViT is used to reduce the number of parameters while efficiently extracting both local and global features; the SCNeck neck network is designed to fuse the extracted features without losing information; and the DEHead detection head is utilized for multi-scale feature fusion to detect the targets. …”
    Get full text
    Article