Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
24021
Antigen Delivery Platforms for Next-Generation Coronavirus Vaccines
Published 2024-12-01“…This review will (1) present the current state of antigen delivery platforms involving a multifaceted approach, including bioinformatics, molecular and structural biology, immunology, and advanced computational methods; (2) discuss the challenges facing the development of safe and effective antigen delivery platforms; and (3) highlight the potential of nucleoside-modified mRNA encapsulated in lipid nanoparticles (LNP) as the platform that is well suited to the needs of a next-generation pan-CoV vaccine, such as the ability to induce broad-based immunity and amenable to large-scale manufacturing to safely provide durable protective immunity against current and future Coronavirus threats.…”
Get full text
Article -
24022
Imagined Movement Recognition in People with Disabilities Using Common Sparse Spatio Spectral Pattern (CSSSP) and Sequential Features Selection (SFS)
Published 2025-01-01“…The brain interface system intends to prepare direct connectivity between the brain and the computer to be aware of the requests of an individual and use them as a control signal for external devices. …”
Get full text
Article -
24023
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
24024
Extraction and Characterization of Natural Coagulant Made from Banana Plant Stems (Musa acuminate) for the Removal of Turbidity from Wastewater
Published 2023-01-01“…After extraction, the coagulation efficiency of each produced coagulant was computed in terms of their turbidity removal efficiency (%) from sampled wastewater. …”
Get full text
Article -
24025
Diagnostic methods employing kidney biomarkers clinching biosensors as promising tools
Published 2024-01-01“…Existing diagnostic techniques used for monitoring kidney biomarker concentration include chromatographic assays, spectroscopic assays, immunoassays, magnetic resonance imaging (MRI), computed tomography (CT), etc. They also necessitate equipped laboratory infrastructure, specific instruments, highly trained personnel working on these instruments, and monitoring kidney patients. …”
Get full text
Article -
24026
Applied Comparison of Meta-analysis Techniques
Published 2013-02-01“…Proper meta-analysis includes five basic steps: identify relevant studies; extract summary data from each paper; compute study effect sizes, perform statistical analysis; and interpret and report the results. …”
Get full text
Article -
24027
Localization of mobile robot in prior 3D LiDAR maps using stereo image sequence
Published 2024-06-01“…A novel localization approach for mobile ground robot, which successfully combines conventional computer vision techniques, neural network based image analysis and numerical optimization, is proposed. …”
Get full text
Article -
24028
FDK-Type Algorithms with No Backprojection Weight for Circular and Helical Scan CT
Published 2012-01-01“…s algorithm in terms of computational complexity.…”
Get full text
Article -
24029
Colonic Wall Thickening Reported in Abdominal CT: Does It Always Imply Malignancy?
Published 2019-01-01“…In this study, we aimed to examine the effect of the age, hemoglobin (Hb), albumin, neutrophil lymphocyte ratio (NLR), thrombocyte lymphocyte ratio (PLR), and mean platelet values (MPV) on the separation of benign and malignant diseases in patients with suspected colon wall thickness (CWT) observed in abdominal computed tomography (CT) examination. Method. The study included 116 patients between the ages of 18 and 95 who had CT examination where the colon wall could be evaluated and who also had colonoscopy. …”
Get full text
Article -
24030
Variable domain mutational analysis to probe the molecular mechanisms of high viscosity of an IgG1 antibody
Published 2024-12-01“…Here, we combined X-ray crystallography with computational modeling to predict regions of an anti-glucagon receptor (GCGR) IgG1 antibody prone to self-interaction. …”
Get full text
Article -
24031
Seroprevalence and Trends in Human Immunodeficiency Virus Among Voluntary Non-Remunerated Blood Donors in a Teaching Hospital: Nine-year Retrospective Study
Published 2024-04-01“…Data such as age, gender, marital status, frequency of donations, and serological results were obtained from the computer system of the blood bank and analyzed. Results: A total of 98,874 individuals donated blood and were screened for HIV infections. …”
Get full text
Article -
24032
Cerebral Arterial Stenosis Detection Based on a Retained Two-Stage Detection Algorithm
Published 2022-01-01“…Stroke is one of the fatal diseases worldwide, and its primary mechanism is produced by cerebrovascular stenosis, blockages, or embolisms. Computer-aided diagnosis can assist clinical practitioners in identifying cerebrovascular anomalies, elucidating the precise lesions’ location in the patients, and providing guidance for clinical therapy. …”
Get full text
Article -
24033
Daar is méér. ’n Outobiografiese reisverhaal deur Amper-Stamperland en Metaversum
Published 2023-12-01“…; “Klopdisselboom met ’n pedonkiekar in Amper-Stamperland”; “Pikkewouters: Amperkaraktertjies in die Wilde Weste van stamper”; “bewolkte rekenarisering” (“computer clouding”); “blokkettings” (“block chains”). …”
Get full text
Article -
24034
Considerations for ethics review of big data health research: A scoping review.
Published 2018-01-01“…The methodological novelty and computational complexity of big data health research raises novel challenges for ethics review. …”
Get full text
Article -
24035
Hyperandrogenism, Elevated 17-Hydroxyprogesterone and Its Urinary Metabolites in a Young Woman with Ovarian Steroid Cell Tumor, Not Otherwise Specified: Case Report and Review of t...
Published 2019-01-01“…Transvaginal ultrasound and [18F]− fluorodeoxyglucose positron emission tomography–computed tomography (FDG PET–CT) enabled the localization of a right ovarian tumor. …”
Get full text
Article -
24036
In Silico Study of Coumarins: Wedelolactone as a Potential Inhibitor of the Spike Protein of the SARS-CoV-2 Variants
Published 2023-01-01“…Herein, the inhibition potential of several naturally occurring coumarins was investigated against the spike proteins of SARS-CoV-2 variants using computational approaches. Molecular docking studies revealed 26 coumarins with better binding energies than the reference ligands, molnupiravir and ceftazidime, against the S-RBD of the omicron variant. …”
Get full text
Article -
24037
Clustering by Hybrid K-Means-Based Rider Sunflower Optimization Algorithm for Medical Data
Published 2022-01-01“…This hybrid algorithm can get the advantages of both K-means and RSFO technique and avoid premature convergence of K-means algorithm and high computation cost of optimization technique. K-Means clustering algorithm is used to cluster the medical data by using an optimum centroid. …”
Get full text
Article -
24038
Removal of an Aural Foreign Body by Magnetism
Published 2025-01-01“…Case Presentation: A male patient in his thirties with a history of polysubstance use presented to the emergency department (ED) due to an abrasion on his left forehead caused by banging his head against a wall in self-injurious behavior. A non-contrast computed tomography of the head obtained to rule out intracranial injury incidentally demonstrated a radiodense foreign body in the left external ear canal. …”
Get full text
Article -
24039
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
Get full text
Article -
24040
River water quality monitoring using machine learning with multiple possible in-situ scenarios
Published 2025-06-01“…The study looks into the possibility of estimating WQI solely using dissolved oxygen (DO) and pH as predictors because the chemical parameters in the current Malaysian WQI calculation method takes some time to compute. This research provides insight into the accuracy, precision, and general performance of these models in predicting water quality by looking at the residuals of various scenarios and evaluating performance metrics across different machine learning models. …”
Get full text
Article