Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
26381
An analysis of missed injuries in patients with severe trauma
Published 2022-12-01“…The final diagnoses of missed injuries were confirmed by computed tomography (44.5%), magnetic resonance imaging (19.3%), X-ray (19.3%), bone scan (11.8%), and physical examination (5.0%). …”
Get full text
Article -
26382
AutoMEX: Streamlining material extrusion with AI agents powered by large language models and knowledge graphs
Published 2025-03-01“…While the framework shows promising potential, challenges such as the computational demands of advanced LLMs and the need for continual updates to the KG remain areas for future work. …”
Get full text
Article -
26383
T cell immune senescence is associated with frailty and sarcopenia in lung transplant candidates
Published 2025-02-01“…Methods: Patients over age 55 years undergoing evaluation for lung transplantation were evaluated for sarcopenia by cross-sectional area and average attenuation of the pectoralis major muscle on chest computed tomography. Frailty was measured using the Fried Frailty Phenotype. …”
Get full text
Article -
26384
Path-Based Approach for Expanding Rail Transit Network in a Metropolitan Area
Published 2022-01-01“…A rail transit network along a metropolitan corridor was studied as an example. Multiple computational experiments were conducted, and the results illustrate the validity and practicality of the proposed methodology for solving the problem.…”
Get full text
Article -
26385
Evaluating the usefulness of plasma chromogranin A measurement in cyclic ACTH-dependent Cushing’s syndrome
Published 2024-10-01“…A subsequent follow-up computed tomography revealed a pulmonary lesion, and ectopic ACTH secretion from this lesion was confirmed by pulmonary artery sampling. …”
Get full text
Article -
26386
THERMAL PERFORMANCE EVALUATION AND ANALYSIS OF THE EFFICIENT and SUSTAINABILITY SHELL AND TUBE HEAT EXCHANGER SYSTEM
Published 2021-07-01“…The objective of the study is to model and analysis of thermal performance and heat transfer in the advanced STHE system by using ANSYS Fluent along with the experiment. The advanced computational simulation tool, ANSYS Fluent, and AutoCAD were used to model the STHE system along with the one shell (8” diameter), five tubes (1” diameter) and four baffles. …”
Get full text
Article -
26387
Multiple states clustering analysis (MSCA), an unsupervised approach to multiple time-to-event electronic health records applied to multimorbidity associated with myocardial infarc...
Published 2025-02-01“…In MSCA, patients’ pairwise dissimilarities are computed using patients’ state matrices which are composed of multiple censored time-to-event indicators reflecting patients’ health history. …”
Get full text
Article -
26388
ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments
Published 2024-01-01“…Research on vehicle-to-everything (V2X) is attracting significant attention nowadays, driven by the recent advances in beyond-5G (B5G) networks and the multi-access edge computing (MEC) paradigm. However, the inherent heterogeneity of B5G combined with the security vulnerabilities of MEC infrastructure in dynamic V2X scenarios introduces unprecedented challenges. …”
Get full text
Article -
26389
Analyzing and Visualizing Uncertain Knowledge: The Use of TEI Annotations in the PROVIDEDH Open Science Platform
Published 2022-09-01“…There are many possible explanations for uncertainty’s lack of visibility in computationally supported humanities research; among them, the need for tools specifically designed to address the goal of defining and managing uncertainty stands out. …”
Get full text
Article -
26390
Celiac Artery Compression After a Spine Fracture, and Pericardium Rupture After Blunt Trauma: A Case Report from a Single Injury
Published 2021-06-01“…There were no definite neurologic deficits. Her initial computed tomography (CT) scan revealed multiple rib fractures, moderate lung contusions with hemothorax, moderate liver injury, and severe lumbar spine fracture and dislocation. …”
Get full text
Article -
26391
Learning the factors controlling mineral dissolution in three-dimensional fracture networks: applications in geologic carbon sequestration
Published 2025-01-01“…This study is a first step towards characterizing the parameters that control carbon mineralization using an approach with integrates computational physics and machine learning.…”
Get full text
Article -
26392
Surface molecular engineering to enable processing of sulfide solid electrolytes in humid ambient air
Published 2025-01-01“…Importantly, the thiol modification extends the amount of time that the sulfide SSE can be exposed to air with 33% relative humidity (33% RH) with limited degradation of its structure while retaining a conductivity of above 1 mS cm-1 for up to 2 days, a more than 100-fold improvement in protection time over competing approaches. Experimental and computational results reveal that the thiol group anchors to the SSE surface, while the hydrophobic hydrocarbon tail provides protection by repelling water. …”
Get full text
Article -
26393
Open resection and reconstruction of a Nasoseptal Chondrosarcoma: case report and literature review
Published 2020-03-01“…Case presentation A 75-year-old woman presented with a 3-year history of a slow growing, firm mass in the nasal tip causing protrusion and septal fullness. Computed Tomography scan of the paranasal sinuses revealed a well-circumscribed, 2.2 cm mass at the anterior nasal septum extending into the right vestibule. …”
Get full text
Article -
26394
Understanding uncertainties in the satellite altimeter measurement of coastal sea level: insights from a round-robin analysis
Published 2025-01-01“…Here, we take advantage of the recent availability of many new algorithms developed for altimetry sea level computation to quantify and analyze the uncertainties associated with the choice of algorithms when approaching the coast. …”
Get full text
Article -
26395
Sex- and site-specific, age-related changes in bone density – a Terry collection study
Published 2023-02-01“…Peripheral quantitative computed tomography (pQCT) was used to scan the dry bones. …”
Get full text
Article -
26396
Comparable Effects of High-Intensity Interval Training and Prolonged Continuous Exercise Training on Abdominal Visceral Fat Reduction in Obese Young Women
Published 2017-01-01“…The abdominal visceral fat area (AVFA) and abdominal subcutaneous fat area (ASFA) of the participants were measured through computed tomography scans preintervention and postintervention. …”
Get full text
Article -
26397
Research on affine equivalence enumeration of the three families vectorial function
Published 2017-11-01“…In recent years,Qu-Tan-Tan-Li function,Zha-Hu-Sun function and Tang-Carlet-Tang function have been proposed with differential uniformity 4 and many good cryptographic properties.the counting problem of affine equivalent to the three families cryptographic functions was investigated.By using some properties of finite fields,the upper and lower bound of the number of affine equivalent to the Zha-Hu-Sun function,and the upper bound of the number of affine equivalent to the Qu-Tan-Tan-Li function and Tang-Carlet-Tang function were computed,respectively.Moreover,a conjecture was given about the exact number of affine equivalent to the Zha-Hu-Sun function.Results show that there are at least<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2</mn> <mrow> <mn>53</mn></mrow> </msup> <msup> <mrow><mo>[</mo> <mrow> <mstyle displaystyle="true"> <munderover> <mo>∏</mo> <mrow> <mi>i</mi><mo>=</mo><mn>1</mn></mrow> <mn>8</mn> </munderover> <mrow> <mo stretchy="false">(</mo><msup> <mn>2</mn> <mi>i</mi> </msup> <mo>−</mo><mn>1</mn><mo stretchy="false">)</mo></mrow> </mstyle></mrow> <mo>]</mo></mrow> <mn>2</mn> </msup> </math></inline-formula>cryptographic functions of affine equivalent to the Zha-Hu-Sun function over finite field GF(2<sup>8</sup>),which can be chosen as S-boxes of block ciphers.…”
Get full text
Article -
26398
Predecting power transformer health index and life expectation based on digital twins and multitask LSTM-GRU model
Published 2025-01-01“…To this end, this study introduces a proposed new architecture called a Smart Electricity Monitoring System based on Fog Computing and Digital Twins (SEMS-FDT) for monitoring the health performance of transformers by measuring the THI rate in real time. …”
Get full text
Article -
26399
Optimization of Vehicle Paths considering Carbon Emissions in a Time-Varying Road Network
Published 2022-01-01“…Regarding the study of the time-dependent green vehicle path problem (TDGVRP), most of the literature uses the step function to represent the vehicle speed change in order to reduce the computation, ignoring the continuity of vehicle speed, which leads to the lack of accurate carbon emissions measurement. …”
Get full text
Article -
26400
Numerical Solution of Binary Liquid-Phase Adsorption onto Porocel Clay Using Linear, Freundlich and Langmuir Isotherms
Published 2005-04-01“…The model was applied to the binary adsorption, without reaction, of aromatics and sulphur compounds onto a fixed bed of Porocel clay for kerosene deodorization using linear, Freundlich and Langmuir isotherms independently. A computational scheme for the solution of the model equations is presented. …”
Get full text
Article