Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
17361
Clustering by Hybrid K-Means-Based Rider Sunflower Optimization Algorithm for Medical Data
Published 2022-01-01“…This hybrid algorithm can get the advantages of both K-means and RSFO technique and avoid premature convergence of K-means algorithm and high computation cost of optimization technique. K-Means clustering algorithm is used to cluster the medical data by using an optimum centroid. …”
Get full text
Article -
17362
Removal of an Aural Foreign Body by Magnetism
Published 2025-01-01“…Case Presentation: A male patient in his thirties with a history of polysubstance use presented to the emergency department (ED) due to an abrasion on his left forehead caused by banging his head against a wall in self-injurious behavior. A non-contrast computed tomography of the head obtained to rule out intracranial injury incidentally demonstrated a radiodense foreign body in the left external ear canal. …”
Get full text
Article -
17363
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
Get full text
Article -
17364
River water quality monitoring using machine learning with multiple possible in-situ scenarios
Published 2025-06-01“…The study looks into the possibility of estimating WQI solely using dissolved oxygen (DO) and pH as predictors because the chemical parameters in the current Malaysian WQI calculation method takes some time to compute. This research provides insight into the accuracy, precision, and general performance of these models in predicting water quality by looking at the residuals of various scenarios and evaluating performance metrics across different machine learning models. …”
Get full text
Article -
17365
The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems
Published 2022-01-01“…Based on the real-time computing technology of massive data, the label optimization scheme of collaborative filtering and reinforcement learning is used to realize the logistics distribution recommendation model and to solve the accuracy and real-time problems of logistics service distribution analysis.…”
Get full text
Article -
17366
Identification of blood plasma protein ratios for distinguishing Alzheimer's disease from healthy controls using machine learning
Published 2025-02-01“…Proteins in the plasma were quantified using specialized panels designed for proteomic extension assays. Through computational analysis using a linear support vector machine algorithm, we identified 82 differentially expressed proteins between the two groups. …”
Get full text
Article -
17367
Application of Peaks Over Threshold Method in Flood Frequency Analysis in Seyhan Basin
Published 2020-07-01“…Finally, flood quantities with the recurrence intervals of 2, 5, 10, 25, 50, 100, 200, 500 and 1000 years were computed and compared to the corresponding quantities obtained from the annual maximum series. …”
Get full text
Article -
17368
Research of the microwave generator and antenna emitters for hyperthermia of oncological diseases
Published 2022-11-01“…The materials and methods of computational mathematics, ultrahigh frequency technology and the theory of automatic regulation are used in the study. …”
Get full text
Article -
17369
Sentiment Analysis from Face Expressions Based on Image Processing Using Deep Learning Methods
Published 2022-12-01“…This study conducted to demonstrate that real-time expression recognition systems based on deep learning techniques with the most appropriate architecture can be implemented with high accuracy via computer hardware with only one software. In addition, it is shown that high accuracy rate is achieved in real-time applications when Histograms of Oriented Gradients (HOG) is used as a feature extraction method and ResNet architecture is used for classification.…”
Get full text
Article -
17370
A Rare Cause of Pain in a Patient Following Roux-en-Y Choledochojejunostomy
Published 2024-01-01“…The work up revealed mild leukocytosis and computed tomography (CT) imaging that showed dilation of the distal CBD remnant. …”
Get full text
Article -
17371
Digital twin-centered hybrid data-driven multi-stage deep learning framework for enhanced nuclear reactor power prediction
Published 2025-01-01“…Traditional physics-based models, while valuable, can be computationally intensive and may not fully capture the complexities of real-world reactor behavior. …”
Get full text
Article -
17372
Implication of inter-joint coordination on the limb symmetry index measured during the seated single-arm horizontal push test
Published 2025-02-01“…Humerothoracic, elbow and wrist joint contributions to the horizontal medicine ball velocity were computed. The temporal occurrence of joint peak contribution was used to assess inter-joint coordination.ResultsThe temporal occurrence of joint peak contribution occurred in a proximo-to-distal sequence at the dominant side, while at the nondominant side, joint peak contribution first occurred at shoulder, then simultaneously at elbow and wrist. …”
Get full text
Article -
17373
Hydrodynamics of flow through living shoreline structure
Published 2025-01-01“…The study also explored a zig-zag formation using 3D computational fluid dynamics (CFD) with the RNG k-ε turbulence model, offering detailed insights into the flow behavior around the structures. …”
Get full text
Article -
17374
4d N $$ \mathcal{N} $$ = 1 from 6d D-type N $$ \mathcal{N} $$ = (1, 0)
Published 2020-01-01“…We start by compactifying the 6d SCFT on a Riemann surface and compute the central charges of the resulting 4d theory by integrating the 6d anomaly polynomial over the Riemann surface. …”
Get full text
Article -
17375
Synthesis, Characterization, Semiempirical and Biological Activities of Organotin(IV) Carboxylates with 4-Piperidinecarboxylic Acid
Published 2014-01-01“…HOMO-LUMO calculations show that chlorodiorganotin complexes are more susceptible to nucleophilic attack as compared to triorganotin complexes. Computed negative heat of formation indicates that complexes 1–4 are thermodynamically stable. …”
Get full text
Article -
17376
The classification of absence seizures using power-to-power cross-frequency coupling analysis with a deep learning network
Published 2025-02-01“…Power-to-power coupling (PPC) is one form of coupling with significant research attesting to its neurobiological significance as well as its computational efficiency, yet has been hitherto unexplored within seizure classification literature. …”
Get full text
Article -
17377
Performance Assessment of GaAs Pocket-Doped Dual-Material Gate-Oxide-Stack DG-TFET at Device and Circuit Level
Published 2024-01-01“…Using the Silvaco Technology Computer-Aided Design tool, the comparison covers DC characteristics, analog/RF behavior, and circuit-level assessments. …”
Get full text
Article -
17378
Volumetric trans-scale imaging of massive quantity of heterogeneous cell populations in centimeter-wide tissue and embryo
Published 2025-02-01“…The 3D resolving capability was realized through a combination of optical and computational sectioning techniques tailored for our low-power imaging system. …”
Get full text
Article -
17379
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01“…The results show that the proposed scheme provides essential security features and resists several well-known attacks. Evaluating the computation complexity and space complexity of the proposed protocol also verifies its superior performance compared with similar schemes.…”
Get full text
Article -
17380
Group-Based Authentication Methods in The OneM2M Ecosystem
Published 2022-12-01“…By using the group management module provided by the IoT service platform and the “auth” mechanism's together, it has been observed that the computational overhead on the devices and the signal traffic in the environment provide up to 4 times efficiency according to performance measurements. …”
Get full text
Article