Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
6741
Predicting academic procrastination of students based on academic self-efficacy and emotional regulation difficulties
Published 2025-01-01“…Descriptive statistics, t-test, ANOVA, Pearson’s correlation coefficient, and multiple linear regression were employed to examine the data using SPSS 23 software. …”
Get full text
Article -
6742
Nutritional knowledge and practices of low-income women during pregnancy: a qualitative study in two Oaxacan cities
Published 2025-02-01“…Conclusion Nutritional knowledge and practices during pregnancy are impacted by multiple social identities women have and different factors at the individual, group, and structural level. …”
Get full text
Article -
6743
The research progress on effective connectivity in adolescent depression based on resting-state fMRI
Published 2025-02-01“…Existing studies focus on the analysis of a single brain network, but rarely explore the interaction between multiple key networks.DiscussionTo do so, we can address these issues by integrating multiple technologies. …”
Get full text
Article -
6744
Risk Factors for Postoperative Nausea and Vomiting After TACE: A Prospective Cohort Study
Published 2024-12-01“…To identify risk factors for PONV, multiple logistic regression analysis was used. The receiver operating characteristic (ROC) curve was plotted to assess the regression model. …”
Get full text
Article -
6745
Quantifying uncertainty in anthropogenic causes of injury and mortality for an endangered baleen whale
Published 2024-12-01“…Our approach is relevant to other monitored populations where cause‐specific injuries from multiple threats can be observed in live and dead individuals.…”
Get full text
Article -
6746
IMU Sensor-Based Worker Behavior Recognition and Construction of a Cyber–Physical System Environment
Published 2025-01-01“…Additionally, about 500 fatalities occur annually, and multiple studies are being conducted to prevent these accidents and quickly identify their occurrence to secure the golden time for the injured. …”
Get full text
Article -
6747
Identification of Parkinson’s disease using MRI and genetic data from the PPMI cohort: an improved machine learning fusion approach
Published 2025-02-01“…Furthermore, by analyzing the features selected across multiple iterations of our models, we identified stable brain region features [lh 6r (FD) and rh 46 (GI)] and key genetic markers (rs356181 and rs2736990 SNPs within the SNCA gene region; rs213202 SNP within the VPS52 gene region), highlighting their potential as reliable early diagnostic indicators for the disease.ConclusionThe AE_Stacking model, trained on MRI and genetic data, demonstrates potential in distinguishing individuals with PD. …”
Get full text
Article -
6748
BUILDING THE FORECASTING SYSTEM OF DECISION-MAKING IN CLOUD COMPUTING
Published 2013-06-01“…This paper focus on the visualized software solution with the purpose of providing multiple services in the fields of business, commerce, education, health, tourism, etc. by collecting data via internet and building decision tree to predict forecast report to user through the algorithm C4.5. …”
Get full text
Article -
6749
Resource management in sliced networks with mobile edge computing for B5G and 6G
Published 2021-06-01“…With the time-delay sensitive compute-intensive tasks growing exponentially, 5G and future 6G mobile cellular communication networks will form differentiated network slices with edge computing resource to service the multiple communication services.To achieve this, the wireless frequency and edge computing resources will be shared among the network slices, thus the efficient management of the resources is of great importance.The demands of resources management in the life duration of the network slice was analyzed.Then the research progress of the corresponding technologies for slices, i.e., access control, resources allocation and stimulating cooperation among terminals, were summarized.And the open research issue was given.Thus, the resources are managed efficiently for the slices with edge computing resource.…”
Get full text
Article -
6750
Dynamic roles of tumor-infiltrating B lymphocytes in cancer immunotherapy
Published 2025-02-01“…Naive B cells present the initial antigen, germinal center B cell subsets enhance antibody affinity, and immunoglobulin subtypes exert multiple immune effects, while regulatory B cells establish immune tolerance. …”
Get full text
Article -
6751
Energy-efficiency maximization scheme for data collection in wireless power communication networks
Published 2019-12-01“…WPCN composed of multiple RF energy sources and sinks was studied.The energy efficiency of data collection were maximized by jointly optimizing the transmission power of energy sources,the time allocation of wireless energy transfer and the time allocation of nodes’ data transmission.Specifically,the energy efficiency maximization problem was modeled firstly.Then,the optimal value of transmitted power was obtained,and the monotonicity of energy-efficiency function and the convexity of throughput function were further deduced.Finally,based on these properties,an efficient algorithm which combines golden-section search and bisection search was designed to get the optimal solution quickly.The simulation results show that the proposed optimal algorithm can significantly improve the energy efficiency compared with the baseline scheme.…”
Get full text
Article -
6752
Database for a temperature model along urban Dâmbovița River
Published 2025-01-01“…To this end, in the summers of 2020, 2021 and 2023 were acquired using multiple data of hydraulic and climate variables using temperature loggers equipped with bluetooth technology and remote sensing climate data retrieved from Open Weather. …”
Get full text
Article -
6753
Marsilea: an intuitive generalized paradigm for composable visualizations
Published 2025-01-01“…To address this, we introduce “cross-layout,” a novel visualization paradigm that integrates multiple plot types in a cross-like structure, with a central main plot surrounded by secondary plots for enhanced contextualization and interrelation insights. …”
Get full text
Article -
6754
New delay measurement method based on accurate timestamp in OpenFlow
Published 2017-11-01“…At present,delay measurement methods in OpenFlow network have the disadvantage of excessive network resources and poor measurement accuracy.DeMon,an active mechanism to measure the delay of multiple paths between any two switch based on the controllable feature of individual traffic flow provided in OpenFlow was proposed.DeMon required only one probe packet to be send from controller,which was excepted to reduce the operational cost.Moreover,DeMon used OpenFlow switch instead of controller to get the timestamp of probe packet,making the measurement accuracy and stability have been greatly improved compared with other monitoring techniques in the OpenFlow network.…”
Get full text
Article -
6755
Collaboration coding to multi-node repair program under the twin-MDS codes framework in cloud storage systems
Published 2015-11-01“…A multi-node exact repair code scheme,which can repair multiple system nodes or redundant nodes simultaneously,was shown and proved to against the disadvantages of the existing multi-node repair model in cloud storage.The multi-node exact repair code was combined with a twin-MDS codes framework with health cooperative nodes.In this way,repair bandwidth,the number of repair links and the amount of data to be treated in an intermediate node were reduced,while multi-node were repaired.Finally,numerical simulation results show that this scheme has greater improvements.In particular,it reduces the load in an intermediate node.And the advantages was more obvious with the more storage nodes in cloud storage.…”
Get full text
Article -
6756
Acute diquat poisoning induces paralytic ileus and hepatic portal venous gas: a case report
Published 2025-02-01“…Despite aggressive treatment, including gastric lavage, drainage, and blood purification, the patient ultimately succumbed to multiple organ failure. This report explores the potential causes of HPVG, including infection and elevated intestinal pressure, and highlights the possibility that montmorillonite may have exacerbated this process.…”
Get full text
Article -
6757
Design of tree topology based Byzantine fault tolerance system
Published 2017-11-01“…A tree topology based Byzantine fault tolerance system was designed and the calculation of the Byzantine node bound based on depth and width was given.The consistency protocol was designed through divide the tree into groups by communication and work,which guaranteed the safety of system.The access of a node was determined with joint signature mechanism.The Byzantine nodes were placed to the leaves by view change protocol,which guaranteed the liveness of the system.On the foundation of traditional protocol,the new protocol support multiple tasks operating at the same time,and communication between nodes is largely decreased,as well as the space complexity,hence the feasibility being promoted,and the gap between Byzantine fault tolerance system and the non-Byzantine systems being narrowed.…”
Get full text
Article -
6758
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01“…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
Get full text
Article -
6759
On functionals of a marked Poisson process observed by a renewal process
Published 2001-01-01“…In various stochastic models applications (such as queueing with N-policy combined with multiple vacations), it is necessary to operate with the value of Π prior to the first passage time, or prior to the first passage time plus some random time. …”
Get full text
Article -
6760
Multifactorial QT Interval Prolongation and Takotsubo Cardiomyopathy
Published 2014-01-01“…The case highlights the role of TCM as a cause of LQTS in the setting of multiple risk factors including old age, female gender, hypokalemia, and treatment with QT prolonging medications. …”
Get full text
Article