Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
27401
Scenarios of automated driving based on a switchboard for driving forces - an application to the Netherlands
Published 2025-01-01“…For each scenario, a modelling approach is used to compute the impact of automated driving on vehicle kilometres driven and congestion. …”
Get full text
Article -
27402
Magnetic resonance imaging -based radiomics of the pituitary gland is highly predictive of precocious puberty in girls: a pilot study
Published 2025-02-01“…Pearson correlation between RFs and auxological, biochemical, and ultrasound data was also computed.ResultsTwo different radiomic parameters, Shape Surface Volume Ratio and Glrlm Gray Level Non-Uniformity, predicted CPP with a high diagnostic accuracy (ROC-AUC 0.81 ± 0.08) through the application of our ML algorithm. …”
Get full text
Article -
27403
Thermal Response and Degressive Reaction Study of Oxo-Biodegradable Plastic Products Exposed to Various Degradation Media
Published 2019-01-01“…The methodology used followed the International Confederation for Thermal Analysis and Calorimetry (ICTAC) recommendation for thermal stability and the computation of kinetic parameters. The degradation reaction kinetics were also determined postexposure to degressive media. …”
Get full text
Article -
27404
APOE4 and infectious diseases jointly contribute to brain glucose hypometabolism, a biomarker of Alzheimer's pathology: New findings from the ADNI.
Published 2025-01-01“…Marginal mean estimates for infections, stratified by APOE4 carrier status, were then computed.<h4>Results</h4>Prior infections were associated with greater HCI [β = 0.15, 95% CI: 0.03, 0.27, p = 0.01]. …”
Get full text
Article -
27405
Patterns Of HRCT In Patients with Pulmonary Tuberculosis At A Tertiary Care Hospital
Published 2024-06-01“… Abstract: Background: With the advancement in biomedical engineering and imaging technology, HRCT scan has emerged as more effective tool than standard1computed tomography scan & traditional chest radiography in detecting pulmonary pathologies including pulmonary tuberculosis. …”
Get full text
Article -
27406
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&amp;CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&amp;CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
27407
Descriptive study of the role of ultrasound in the evaluation of patients with interstitial lung disease associated with autoimmune connective tissue disorders
Published 2023-01-01“…Background and Aim: High-resolution computed tomography (HRCT) of the chest has been the conventionally accepted modality of radiological investigation utilized in the evaluation and management of interstitial lung diseases (ILDs). …”
Get full text
Article -
27408
Designing a prototype trauma registry framework for a tertiary health institution in a low- and middle-income country: A qualitative study.
Published 2025-01-01“…Following this scope, the analysis led to the identification of 21 essential components and activities for the TR, which were then organised into six categories: registry personnel, computers and other materials, trainings, technology infrastructure, administrative services, and monitoring and evaluation.…”
Get full text
Article -
27409
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article -
27410
A perspective on the current state of smartphone-based mobile applications for scar assessment
Published 2025-01-01“…Traditionally, these assessments required specialized, bulky equipment that needed a wired connection to computers, making these assessment tools less accessible and efficient. …”
Get full text
Article -
27411
NATE: Non-pArameTric approach for Explainable credit scoring on imbalanced class.
Published 2024-01-01“…Logistic regression is widely used in credit scoring due to its robustness, interpretability, and computational efficiency; however, its predictive power decreases when applied to complex or non-linear datasets, resulting in reduced accuracy. …”
Get full text
Article -
27412
Fat-tail allele-specific expression genes may affect fat deposition in tail of sheep.
Published 2024-01-01“…An RNA-Seq-based variant calling was applied to perform genome-wide survey of ASE genes using 45 samples from seven independent studies comparing the transcriptome of fat-tail tissue between fat- and thin-tailed sheep breeds. Using a rigorous computational pipeline, 115 differential ASE genes were identified, which were narrowed down to four genes (LPL, SOD3, TCP1 and LRPAP1) for being detected in at least two studies. …”
Get full text
Article -
27413
Collaborative stress of concrete-filled steel tube tied-arch beam-column support based on the double-layer elastic foundation beam theory
Published 2025-01-01“…The results indicated that our derived formulas were consistent with those obtained through finite element meta-computing techniques. Under concentrated loading conditions, it was observed that the load increment at the location of the steel pipe column in the Bailey beam was significantly larger than what traditional averaging methods would predict. …”
Get full text
Article -
27414
Preclinical Evaluation of Ga-DOTA-Minigastrin for the Detection of Cholecystokinin-2/Gastrin Receptor-Positive Tumors
Published 2011-03-01“…In vivo PET imaging was performed using a preclinical PET-computed tomographic scanner. DOTA-MG0 showed high receptor affinity in vitro. …”
Get full text
Article -
27415
Management of a Novel Autoimmune Disease, COPA Syndrome, in Pregnancy
Published 2022-01-01“…A chronic thrombus was noted on computed tomography (CT), and a multidisciplinary team was recommended against Valsalva. …”
Get full text
Article -
27416
Cracked components under anti-plane loading: recent outcomes and future developments
Published 2017-06-01“…Increasingly powerful computers made it possible to investigate three-dimensional effects numerically in detail. …”
Get full text
Article -
27417
Comprehensive Analysis of Breast Cancer Cell Lines: Genome-wide Insights from ChIP-seq Analysis
Published 2024-12-01“…Motif analysis was done through the Multiple Expectation maximizations for Motif Elicitation database (https://meme-suite.org/meme/db/motifs). Results: Computational investigation demonstrates the binding sequences of the T47-D breast cancer cell line as TTTTGTATTTTTAGT, and this motif occurs 2123 times in the Homo Sapiens reference genome that is hg19. …”
Get full text
Article -
27418
Characterization of upper airway airflow dynamics in young adults with isolated Robin sequence: An exploratory investigation
Published 2025-03-01“…This study aimed to characterize the upper airways of six young adults (20.83 ± 6.40 years) with IRS, using computational fluid dynamics. Upper airways of six patients were reconstructed using 3D segmentation, generating unstructured hybrid meshes with ≥4 million tetrahedral elements. …”
Get full text
Article -
27419
Minimizing OHS Risks with Spherical Fuzzy Sets as a Verdict to Inventory Management: A Case Regarding Energy Companies
Published 2022-01-01“…Three different actors participated as decision makers (DMs) by the employment of SFS-SAW group decision making approach, where computed categories and delineated research outcomes were scrutinized in details by benchmarking of the results in terms of varying DM assessments and supplier company driven inventoried item groups, where sensitivity analysis on overall results were also performed. 103 out of 270 items of a protoset were analyzed, a subset of 51 items listed in Category I was determined to be used in further analysis. …”
Get full text
Article -
27420
Pacific sailfish (Istiophorus platypterus) in the Eastern Pacific Ocean, association with ocean currents and seasonal effects of upwelling using real-time Argos locations
Published 2025-01-01“…In this study, Wildlife Computers Mk10 satellite transmitters were deployed on sailfish (n = 6) which relayed real time Argos satellite locations and post-release light-derived geolocation positional estimates. …”
Get full text
Article