Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
27281
Indirect determination of hemoglobin A2 reference intervals in Pakistani infants using data mining
Published 2025-01-01“…Hemoglobin A2 was measured using the Bio-Rad Variant™ II analyzer. RIs were computed using an indirect KOSMIC algorithm, which assumes non-pathologic samples follow a Gaussian distribution after Box-Cox transformation. …”
Get full text
Article -
27282
Total Anomalous Pulmonary Venous Connection in Mother and Son with a Central 22q11.2 Microdeletion
Published 2021-01-01“…The maternal grandmother was unaffected by heart disease. However, heart computed tomography scan of the maternal aunt revealed a quadricuspid aortic valve. …”
Get full text
Article -
27283
Application of Securitization of Leasing Assets
Published 2014-04-01“…Nomenclature of property includes office, medical (first of all, stomatology), training, video the equipment, and also a car, motor-equipment, towers of cellular communication production of heavy mechanical engineering and computers. The essence of securitization of leasing assets consists in isolation of streams of leasing payments from risk of bankruptcy of the leasing company. …”
Get full text
Article -
27284
MetArea: a software package for analysis of the mutually exclusive occurrence in pairs of motifs of transcription factor binding sites based on ChIP-seq data
Published 2025-01-01“…MetArea calculates the estimates of recognition performance pAUPRC (partial area under the Precision–Recall curve) for each of the two input single motifs, identifies the “joint” motif, and computes the performance for it too. The goal of the analysis is to find pairs of single motifs A and B for which the accuracy of the joint A&B motif is higher than those of both single motifs.…”
Get full text
Article -
27285
A biomechanical comparison of posterior malleolar fracture fixation using screws and locking plates in Trimalleolar fractures: a finite element study
Published 2025-02-01“…Methods An FE model containing the distal tibia, fibula, talus, and calcaneus was created based on the computed tomographic images of a healthy man without any musculoskeletal disorders. …”
Get full text
Article -
27286
Changes in serum sodium concentration during hemodialysis is a predictor of mortality and cardio-cerebrovascular event
Published 2024-12-01“…Baseline pre-HD SNa and ΔSNa were collected; time-averaged pre-HD SNa and ΔSNa were computed as the mean values within 1-year, 2-year and 3-year intervals after enrollment. …”
Get full text
Article -
27287
A Risk Assessment Algorithm for College Student Entrepreneurship Based on Big Data Analysis
Published 2021-01-01“…Big data analysis technology is a new product formed under the background of cloud computing and Internet technology, which has the characteristics of large data scale, multiple data types, and strong data value and provides more technical support for the researches on the risk assessment algorithm for college student entrepreneurship. …”
Get full text
Article -
27288
Associations between exposure to volatile organic compounds with obesity in adults
Published 2025-03-01“…Linear regression and logistic regression models were employed to estimate β-coefficients or odds ratios (ORs) along with their corresponding 95 % confidence intervals (CIs). Quantile g-computation (Qgcomp) regression, a method designed to evaluate the combined effects of multiple correlated chemical exposures, was used to assess the mixed influence of VOC metabolites on obesity-related outcomes. …”
Get full text
Article -
27289
From Blocking Shots to Blocking GI Transit, This Professional Basketball Player Does It All: A Case Report on Small Bowel Obstruction
Published 2021-01-01“…Initial differential diagnosis included appendicitis, ruptured ectopic pregnancy, and other genitourinary pathology. Computed tomography with contrast revealed distended loops of small bowel with wall thickening, enhancement, and decompressed loops of bowel distally, consistent with an SBO. …”
Get full text
Article -
27290
Non-invasive blood glucose monitoring using PPG signals with various deep learning models and implementation using TinyML
Published 2025-01-01“…Initially, we analyzed 10-second PPG segments; however, our newly developed 1-second signal segmentation technique proved to significantly enhance accuracy and computational efficiency. The selected model, after being optimized and deployed on an embedded device, achieved immediate blood glucose estimation with a processing time of just 6.4 seconds, demonstrating the method’s practical applicability. …”
Get full text
Article -
27291
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
27292
Are preschool Kosovar children anxious on the edge? Validating the Preschool Anxiety Scale
Published 2024-12-01“…The means and standard deviations, reliabilities (Cronbach’s α and mean inter-item correlations), scale intercorrelations for the focal test (PAS), and McDonald’s Omega for internal consistency were computed. Through correlation, t-test, ANOVA and MANOVA we investigated age, gender, parents living place and birth order effects on the PAS Results: Factor analysis validated the original five-factor model after removing two items, suggesting a shorter 26-item version for Kosovar preschoolers. …”
Get full text
Article -
27293
Mobile Application to identify and recognize emotions for children with autism: A systematic review
Published 2023-03-01“…The studies were retrieved from the following four databases: Google Scholar, Scopus, Association for Computing Machinery (ACM), and Institute of Electrical and Electronics Engineers (IEEE). …”
Get full text
Article -
27294
Relationship between sonorheometry parameters and laboratory values in a critical care setting in Italy: a retrospective cohort study
Published 2023-09-01“…The 95% confidence interval (CI) was computed. A P-value <0.05 was considered statistically significant. …”
Get full text
Article -
27295
Newton–Simpson-based predictor–corrector methods for milling chatter stability prediction
Published 2025-01-01“…Within the framework of the semi-discretization scheme, this paper introduces the Newton–Simpson-based predictor–corrector methods to compute milling stability lobe diagrams. Firstly, the milling delay differential equation is transformed into the state space form, and then the time-delayed term and the periodic coefficient matrix of the state space equation are treated as an operator. …”
Get full text
Article -
27296
Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices
Published 2019-08-01“…Waste Collection Vehicles are routed based on the responses while an updatable Reporting Reliability Index (RRI) is computed for each user based on estimate of actual level of waste collected as against the reported level to factor future reporting. …”
Get full text
Article -
27297
Care home resident identification: A comparison of address matching methods with Natural Language Processing.
Published 2024-01-01“…These results show the feasibility of applying NLP methods to real data concluding that computing address similarities outperforms previous works.…”
Get full text
Article -
27298
Accuracy of Focused Assessment with Sonography for Trauma (FAST) in Blunt Abdominal Trauma
Published 2022-01-01“…Intra-abdominal fluid was confirmed using computed tomography or operative findings. The sensitivity, specificity, positive predictive value (PPV), and negative predictive value (NPV) were calculated. …”
Get full text
Article -
27299
Reperfusion injury or cytokine storm? Utilizing plasmapheresis in severe trauma-induced multiorgan failure: a case report
Published 2024-12-01“…A 31-year-old man sustained a stab wound to his left knee. Computed tomography angiography and surgical exploration revealed a transection of the left popliteal artery and vein. …”
Get full text
Article -
27300
Novel Intuitionistic Fuzzy Fault Tree Analysis for Effective Infectious Medical Waste Management
Published 2025-04-01“…The paper proposes an intuitionistic fuzzy fault tree analysis (FFTA) method that quantifies data uncertainty through trapezoidal intuitionistic fuzzy numbers (TrIFN) while novel arithmetic operations are applied for computing the top incident failure possibility. To develop these novel operations, the weakest t-norm is applied to detract the accumulating circumstances of fuzziness, while Algebraic t-norm and t-conorm are used to estimate membership and non-membership degrees, respectively, of top event failure possibility in terms of trapezoidal intuitionistic fuzzy numbers (TrIFN). …”
Get full text
Article