Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
27021
EventSegNet: Direct Sparse Semantic Segmentation from Event Data
Published 2024-12-01“…Compared to the baseline model, the optimized network model reduces the F1 score by 1.1% but is more than twice as fast computationally, enabling real-time inference on the NVIDIA AGX Xavier.…”
Get full text
Article -
27022
Energy feature extraction and visualization of voltage sags using wavelet packet analysis for enhanced power quality monitoring
Published 2025-01-01“…This study contributes to the development of advanced PQ monitoring systems by offering a more precise and computationally efficient method for voltage sag analysis, ultimately helping to protect electrical systems from potential damage and reducing operational costs. …”
Get full text
Article -
27023
PET Study of Sphingosine-1-Phosphate Receptor 1 Expression in Response to Vascular Inflammation in a Rat Model of Carotid Injury
Published 2017-01-01“…Three-dimensional (3D) reconstruction of the first 100-second microPET/computed tomography (CT) image indicated the location of bilateral common carotid arteries. [ 11 C]TZ3321 displayed significantly higher accumulation (standardized uptake values: 0.93 ± 0.07 vs 0.78 ± 0.09, n = 6, P = .001) in the injured carotid artery than in the contralateral side. …”
Get full text
Article -
27024
Quantum Mechanistic Studies of the Oxidation of Ethylene by Rhenium Oxo Complexes
Published 2021-01-01“…The activation and reaction energies for the addition pathways involving multiple spin states (singlet and triplet) have been computed. In all cases, structures on the singlet potential energy surfaces showed higher stability compared to their counterparts on the triplet potential energy surfaces (PESs). …”
Get full text
Article -
27025
Study protocol for an observational study of cerebrospinal fluid pressure in patients with degenerative cervical myelopathy undergoing surgical deCOMPression of the spinal CORD: th...
Published 2020-09-01“…Parts of the data will be used for computational modelling of cervical stenosis.Trial registration number ClinicalTrials.gov Registry (NCT02170155).…”
Get full text
Article -
27026
Access to Healthy Built and Natural Environments and Physical Activity and Screen Time in New Zealand Adolescents: A Geospatial Cross‐Sectional Study
Published 2025-01-01“…., fast‐food outlets) features and their mixture. Quantile g‐computation and multilevel mixed effects models, with adolescents nested within schools, examined associations between the environment and the two health behaviors. …”
Get full text
Article -
27027
On mobility and gait in scoliosis patients: a comparison of conventional and 3D-printed braces during an instrumented timed-up and go test
Published 2025-01-01“…After segmenting each TUG test in sub-phases, metrics quantifying gait and mobility were computed, and Friedman tests among all conditions were performed. …”
Get full text
Article -
27028
Complementary cognitive roles for D2-MSNs and D1-MSNs during interval timing
Published 2025-01-01“…MSN recordings helped construct and constrain a four-parameter drift-diffusion computational model in which MSN ensemble activity represented the accumulation of temporal evidence. …”
Get full text
Article -
27029
Staging of esophageal cancer using PET/MRI: a systematic review with head-to-head comparison
Published 2025-01-01“…., endoscopic ultrasonography (EUS), computed tomography (CT), MRI, and PET/CT) in a full head-to-head manner. …”
Get full text
Article -
27030
Easy, fast and reproducible Stochastic Cellular Automata with chouca
Published 2024-10-01“…Besides providing better reproducibility and accessibility, a fast engine for SCA unlocks novel, computationally intensive statistical approaches, such as simulation-based inference of ecological interactions from field data, which represents by itself an important avenue for research. …”
Get full text
Article -
27031
Florid Cemento-Osseous Dysplasia-Associated Simple Bone Cyst Showing Marked Irregular Border and High Apparent Diffusion Coefficient Value
Published 2020-01-01“…SBC has been reported to occur with fibrous-osseous lesions, including cemento-osseous dysplasia (COD). Computed tomography (CT) imaging findings are sparse, and there are no reports of magnetic resonance imaging (MRI) findings, including apparent diffusion coefficient (ADC) value calculated by diffusion-weighted MRI for the florid COD-associated SBC. …”
Get full text
Article -
27032
Extending the Meshless Natural-Neighbour Radial-Point Interpolation Method to the Structural Optimization of an Automotive Part Using a Bi-Evolutionary Bone-Remodelling-Inspired Al...
Published 2025-01-01“…Topological structural optimization is a powerful computational tool that enhances the structural efficiency of mechanical components. …”
Get full text
Article -
27033
Signature for Pain Recovery IN Teens (SPRINT): protocol for a multisite prospective signature study in chronic musculoskeletal pain
Published 2022-06-01“…Given that chronic pain is a biopsychosocial process, this study aims to discover and validate a robust prognostic signature that measures across multiple dimensions in the same adolescent patient cohort with a computational analysis pipeline. This will facilitate risk stratification in adolescent patients with chronic MSK pain and more resourceful allocation of patients to costly and potentially burdensome multidisciplinary pain treatment approaches.Methods and analysis Here we describe a multi-institutional effort to collect, curate and analyse a high dimensional data set including epidemiological, psychometric, quantitative sensory, brain imaging and biological information collected over the course of 12 months. …”
Get full text
Article -
27034
Numerical modelling of the hydrodynamics driven by tidal flooding of the land surface after dyke breaching
Published 2025-06-01“…The model results also highlight the importance of high-resolution computational grids and variable bottom roughness for simulating the hydrodynamics of small-scale salt marsh restoration projects. …”
Get full text
Article -
27035
Modeling the Process of Obtaining Liquid Pyrolysis Products of Plant Biomass Taking into Account the Rate of their Cooling
Published 2022-08-01“…The article presents the results of computational and experimental studies of thermochemical conversion of wood biomass to obtain liquid pyrolysis products taking into account their cooling rate. …”
Get full text
Article -
27036
Evaluation of CBCT reconstructed tooth models at different thresholds and voxels and their accuracy in fusion with IOS data: an in vitro validation study
Published 2024-12-01“…Abstract Background This study aims to evaluate the impact of different thresholds and voxel sizes on the accuracy of Cone-beam computed tomography (CBCT) tooth reconstruction and to assess the accuracy of fused CBCT and intraoral scanning (IOS) tooth models using curvature continuity algorithms under varying thresholds and voxel conditions. …”
Get full text
Article -
27037
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“….), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
Get full text
Article -
27038
Molecularly imprinted chitosan-based adsorbents for the removal of salicylic acid and its molecular modeling to study the influence of intramolecular hydrogen bonding of template o...
Published 2016-10-01“…The change in the Gibbs free energy (ΔG) for the template–monomer complexes formed between the templates and the functional monomer was computed using density functional theory (DFT) to interpret the nature of the interactions between them and to compare their stabilities. …”
Get full text
Article -
27039
Research on Mine-Personnel Helmet Detection Based on Multi-Strategy-Improved YOLOv11
Published 2024-12-01“…The proposed improvements are realized through three key aspects: Firstly, the traditional convolution is replaced with GSConv, which significantly enhances feature extraction capabilities while simultaneously reducing computational costs. Secondly, a novel C3K2_FE module was designed that integrates Faster_block and ECA attention mechanisms. …”
Get full text
Article -
27040
Measuring overall functional diversity by aggregating its multiple facets: Functional richness, biomass evenness, trait evenness and dispersion
Published 2025-01-01“…We showed that K overcomes several limitations of other indices (e.g. lack of accuracy, not computable for simple communities, unclear ecological interpretation) and is strongly correlated with ecosystem functions in simulated predator–prey communities. …”
Get full text
Article