Suggested Topics within your search.
Suggested Topics within your search.
- Drug Dosage Calculations 1
- Manufacturing processes 1
- Mathematics 1
- Nursing 1
- Nursing Care 1
- Pharmaceutical Preparations 1
- Pharmaceutical arithmetic 1
- SCIENCE / Mechanics / General 1
- TECHNOLOGY & ENGINEERING / Manufacturing 1
- TECHNOLOGY & ENGINEERING / Material Science 1
- administration & dosage 1
- methods 1
-
2521
Utilization of geocoding for mapping infrastructure impacts and mobility due to floods in indonesia based on twitter analytics
Published 2024-09-01“…Then, Named Entity Recognition (NER) identifies locations, which are converted into geographic coordinates through geocoding for map visualization. …”
Get full text
Article -
2522
Gold nanobipyramids-based laser-activated sealants for effective skin sealing and repair
Published 2024-12-01“…These AuNBP-doped laser-activated sealants, or AuNBP-LASE were able to absorb near-infrared laser energy and convert it to heat, thereby inducing transient hyperthermia in the wound and the surrounding tissue. …”
Get full text
Article -
2523
Relative complexity in a model of word difficulty: The role of loanwords in vocabulary size tests
Published 2024-07-01“…Vocabulary Size Test (VST) scores of 2,999 L1 Japanese university students were converted to logit scores to determine the word-learning difficulty of 80 target words. …”
Get full text
Article -
2524
Global Surgeon Opinion on the Impact of Surgical Access When Using Endocutters Across Specialties
Published 2023-09-01“…Round 1 included binary, Likert scale–type, multiple-response, and open-ended questions. These were converted to affirmative statements for round 2 if sufficient agreement was reached. …”
Get full text
Article -
2525
La reescritura prismática del orfismo y sus dimensiones en la poesía de Carles Riba, Agustí Bartra y Josep Sebastià Pons
Published 2024-12-01“…In his poem “Òrfica”, from Els himnes (1974), the myth of Orpheus and Eurydice is rewritten as a new meaning of love as a transcendence removed from the body and converted into a translucent song of waiting. Josep Sebastià Pons, on the other hand, expounds Orphism as a myth of mourning, memory and love as metaphysical knowledge in his posthumous Faula d’Orfeu (1966). …”
Get full text
Article -
2526
Recent Advances and Perspectives on the Use of Mineralocorticoid Receptor Antagonists for the Treatment of Hypertension and Chronic Kidney Disease: A Review
Published 2024-12-01“…The current therapies, including angiotensin-converting enzyme inhibitors, angiotensin II receptor blockers, and sodium–glucose co-transporter 2 inhibitors, are administered to control hypertension, slow the progression of CKD, and reduce cardiovascular risk. …”
Get full text
Article -
2527
State estimation in an islanded hybrid solar-wind DC microgrid using Unscented Kalman Filter
Published 2025-02-01“…To ensure accurate state estimation, a third-order model is utilized for the battery storage system. A DC/DC boost converter is implemented for the photovoltaic system, resulting in a second-order state-space model. …”
Get full text
Article -
2528
Controlled Non-Dominated Sorting Genetic Algorithms for Multi-Objective Optimal Design of Standalone and Grid-Connected Renewable Energy Systems in Integrated Energy Sectors
Published 2025-01-01“…Standalone configurations generate 271 MWh surplus energy annually, with 15 MWh unmet demand, requiring 125 kW power converters. Real scenarios synchronize lower rated power with grid imports, reducing net present costs by 18% and levelized costs by 24%. …”
Get full text
Article -
2529
Revitalizing Customary Law: Reforming Buffalo Farming Practices (Jalangan) in Menaming Village for Sustainable Governance
Published 2024-12-01“…Key strategies such as converting manure into organic fertilizer, utilizing organic materials for fuel, adopting pesticide-free animal feed, and implementing rotational grazing systems are central to the community's approach. …”
Get full text
Article -
2530
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
2531
Gyrotatic dynamics of magneto viscoelastic material with thermal and solutal transport
Published 2025-01-01“…The controlling model of the governing equations is converted from partial differential equations into dimensionless form in terms of ordinary differential equations by using the similarity transformations approach. …”
Get full text
Article -
2532
High interindividual variability of indoxyl sulfate production identified by an oral tryptophan challenge test
Published 2025-01-01“…Abstract Indoxyl sulfate (IS) has been implicated in the pathogenesis of cardiovascular diseases. IS is converted from indole, a metabolite of dietary tryptophan through the action of gut microbial tryptophanase, by two hepatic enzymes: CYP2E1 and SULT1A1. …”
Get full text
Article -
2533
Efficiency-House Optimization to Widen the Operation Range of the Double-Suction Centrifugal Pump
Published 2020-01-01“…Then, the “efficiency-house” theory is introduced to convert the multiple objectives into a single optimization target. …”
Get full text
Article -
2534
An Assay System for Plate-based Detection of Endogenous Peptide:N-glycanase/NGLY1 Activity Using A Fluorescence-based Probe
Published 2025-01-01“…Cytosolic peptide: N-glycanase (PNGase/NGLY1 in mammals), an amidase classified under EC:3.5.1.52, is a highly conserved enzyme across eukaryotes that catalyzes the removal of N-glycans from glycoproteins, converting N-glycosylated asparagine residues into aspartic acid. …”
Get full text
Article -
2535
Femtosecond Laser and Big-Bubble Deep Anterior Lamellar Keratoplasty: A New Chance
Published 2012-01-01“…All procedures were completed as DALK except 2 converted to PK because an inadvertent intraoperative macroperforation occurred. …”
Get full text
Article -
2536
LLM-Guided Crowdsourced Test Report Clustering
Published 2025-01-01“…The method in this paper uses a pre-trained LLM (such as GPT-4) to encode the text in the test report, and uses a visual model such as CLIP to encode the application screenshots, converting the text descriptions and images into high-dimensional semantic vectors. …”
Get full text
Article -
2537
Analysis of the Physicochemical Burden of Oyo State Fish Pond, Ibadan, Southwest Nigeria
Published 2015-07-01“…The pond was originally designed to control storm waters from the high lands around but was later converted for the purpose of commercial fish production and other uses by the State Government. …”
Get full text
Article -
2538
MSVPWM Based-SAPF For Harmonic Mitigation in The Distribution Network Under Unbalanced Condition
Published 2020-06-01“…Three-phase multi-level neutral point clamped (NPC) converter based shunt active harmonic filter (SAHF) are used as a solution to overcome problems due to current harmonics. …”
Get full text
Article -
2539
Named Entity Recognition in Bengali
Published 2010-02-01“…An appropriate tag conversion routine has been defined in order to convert the 122K wordforms of the IJCNLP-08 NER Shared Task on South and South East Asian Languages (NERSSEAL)1 data into the desired forms. …”
Get full text
Article -
2540
Integrating Digital Technology Into Marathon Race With a Technology-Driven Service Design Approach to Enhance Marathoner Experiences
Published 2024-01-01“…Lastly, elite runners had shown a compassionate inclination towards affiliation e-rewards, enabling them to convert their achievements into tangible benefits. …”
Get full text
Article