Showing 7,761 - 7,780 results of 10,931 for search '"software"', query time: 0.09s Refine Results
  1. 7761

    Effect of non-pharmacological interventions on chemotherapy induced delayed nausea and vomiting for tumors: A systematic review and Bayesian network meta-analysis by Yongni Wang, Fang Wang, Feifei Hu, Fang Long

    Published 2025-03-01
    “…A Bayesian network meta-analysis was performed on the response rate to the improvement of chemotherapy induced delayed nausea and vomiting, as well as improvement in KPS score, under different non-pharmacological interventions by using R 4.4.0 software and the GeMTC package. Results: A total of 58 RCTs 4081 patients were selected, involving 14 non-pharmacological interventions. …”
    Get full text
    Article
  2. 7762

    Gyrotatic dynamics of magneto viscoelastic material with thermal and solutal transport by Muhammad, Masood Khan, A.S. Alqahtani, M.Y. Malik

    Published 2025-01-01
    “…The controlling model of the governing equations is converted from partial differential equations into dimensionless form in terms of ordinary differential equations by using the similarity transformations approach. The Maple symbolic software obtains numerical solutions for the resulting nondimensional physical parameters. …”
    Get full text
    Article
  3. 7763

    Frugal Innovations: Implementation in Regions of Poland by Jacek Woźniak

    Published 2023-01-01
    “…The basic research tools were: the CAWI survey questionnaire, PS IMAGO PRO 7.0 software and Microsoft Excel. Findings: The study indicated that: (1) in the A and B regions – both in the area of shaping relationships with customers and shaping innovative processes –moderately high values of Indicator of the Complexity of Shaping Relationships with Customers (ICSRC) and Indicator of the Complexity of Shaping Innovative Processes (ICSIP) indicators were recorded, as well as in the C region, the values are moderately low for both indicators, (2) in the A region, there is a higher level of the complexity of applying the attributes of the concept of frugal innovations with respect to shaping relationships with customers and shaping innovative processes than in the B and C regions. …”
    Get full text
    Article
  4. 7764

    Quantitative Assessment of Posterior Maxillary Arch for Orthodontic Miniscrew Insertion Using Cone Beam Computed Tomography: A Cross-Sectional Analysis by Solmaz Valizadeh, A. Hamid Zafarmand, Sara Hassan Yazdi, Mitra Ghazizadeh Ahsaie

    Published 2022-01-01
    “…The images were analyzed using the NNT viewer software (version 23). The measurements were made on axial sections at 2, 4, 6, and 8 mm from CEJ. …”
    Get full text
    Article
  5. 7765

    A Novel Radio Wave Propagation Modeling Method Using System Identification Technique over Wireless Links in East Africa by Solomon T. Girma, Dominic B. O. Konditi, Ciira Maina

    Published 2018-01-01
    “…Measured received signal levels were collected from three randomly selected urban areas in Ethiopia using a computer, Nemo test tool, Actix software, Nokia phone, and GPS. The result from the simulations was validated against the received experimental signal level measurement taken in a different environment. …”
    Get full text
    Article
  6. 7766

    Simulation Study on the Impact Response of Barrels with Different Rifling Profiles during Bullet Engraving by Zhifang Wei, Yangyang Cheng, Zhiwei Wang, Yanpeng Lin

    Published 2022-01-01
    “…DASSAULT SIMULIA.)/Explicit software was used to build a finite element model of the barrel dynamic stress under heat-force-friction coupling during bullet engraving. …”
    Get full text
    Article
  7. 7767

    Effectiveness of Meta Cognitive Interpersonal Approach Training on Rumination and Self-Esteem in Betrayed Women by Mohammad Mohammadipour, Zahra Montajabian, Sajjad Mohammadipour

    Published 2024-12-01
    “…Data were analyzed using descriptive statistics (mean and standard deviation) and inferential statistics (multivariate and univariate analysis of covariance) in SPSS-25 software. The analysis revealed that meta cognitive interpersonal approach training resulted in an increase in self-esteem, a decrease in rumination, and a rise in self-esteem in betrayed women. …”
    Get full text
    Article
  8. 7768

    Learning in Operation Theatre; Postgraduate Trainees’ Perspective Using OREEM (Operation Theatre Educational Environment Measure) Survey by Ambreen Syed, Musawer Khan, Syed Nasir Shah, Imtiaz uddin, Shoaib Ur Rehman, Naeem Ul Haq

    Published 2025-01-01
    “…The data was analyzed using Excel 2022 software. Results: 71 residents participated in the study. 46 (64.8%) were male and 25 (35.2%) females. …”
    Get full text
    Article
  9. 7769

    Factors influencing utilisation of services provided by community midwives and their non-retention in district Thatta, Pakistan: a qualitative study protocol by Anam Shahil Feroz, Sarah Saleem, Bakhtawar M Hanif Khowaja

    Published 2022-07-01
    “…Data will be analysed through qualitative data analysis software NVivo V.10 and the thematic analysis approach.Ethics and dissemination Ethical approval for this study has been obtained from the Aga Khan University Ethical Review Committee (2020-3391-11138). …”
    Get full text
    Article
  10. 7770

    Predicting academic procrastination based on academic resilience, intolerance of uncertainty, positive and negative perfectionism: The mediating role of experiential avoidance by Mohammad Soltanizadeh, Sara Mortazavian, Zohreh Latifi

    Published 2023-11-01
    “…In order to analyze the data, SPSS-22, and AMOS-20 software’s and to confirm the research model, structural equation modeling was used. …”
    Get full text
    Article
  11. 7771

    Investigating the Indices of Social Capital and its Relationship with Sustainable Urban Development by esmaiel safaralizadeh, majid akbari, vahid boostan ahmadi, chamran mousavi

    Published 2022-09-01
    “…Structural equation modeling and confirmatory factor analysis were used to analyze the descriptive-inferential statistics data and SPSS and Amos software were used. The statistical population of the study was 384 citizens of Ahwaz city and the sampling method was random. …”
    Get full text
    Article
  12. 7772

    Comparative Study of Maximum Power Point Tracking Techniques for Photovoltaic Systems by Fernando Lessa Tofoli, Dênis de Castro Pereira, Wesley Josias de Paula

    Published 2015-01-01
    “…., irradiance and temperature), since the MPP is nonlinear with the environment status. PSIM software is used to validate the assumptions, while relevant results are discussed in detail.…”
    Get full text
    Article
  13. 7773

    Biomorphic design in landscape architecture: An overview and application via experimental design inspired by species Carica papaya l. by Jović Biljana, Zdimalova Maria, Chemarum Benjamin, Stanojević Anđela

    Published 2024-01-01
    “…These three landscape architectural elements are modeled in Building Information Modeling (BIM) software to explore the possibilities of designing biomorphic shapes and patterns as different landscape architectural elements by applying the biomorphic design approach. …”
    Get full text
    Article
  14. 7774

    Defense mechanism of SDN application layer against DDoS attack based on API call management by Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU

    Published 2022-04-01
    “…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
    Get full text
    Article
  15. 7775

    Testing convolutional neural network based deep learning systems: a statistical metamorphic approach by Faqeer ur Rehman, Clemente Izurieta

    Published 2025-01-01
    “…In this article, we attempt to address this problem by using a statistical metamorphic testing (SMT) technique that does not require software testers to worry about fixing the random seeds (to get deterministic results) to verify the metamorphic relations (MRs). …”
    Get full text
    Article
  16. 7776

    Development of neighborhood networks in suburban areas for persuading women to adhere to breast cancer screening programs by Towhid Babazadeh, Zeinab Javadivala, Fatemeh Yaghoubi, Shayesteh Shirzadi, Hava Özkan, Hamid Allahverdipour

    Published 2024-07-01
    “…The data were analyzed with SPSS statistical software version 21. Results: After the intervention, the results showed an improvement in the intention of referring to mammography centers, perceived benefits of early diagnosis of breast cancer, receiving social support, breast cancer screening behaviors, and a decrease in barriers to early diagnosis of breast cancer compared to the control group (P<0.05). …”
    Get full text
    Article
  17. 7777

    The Role of Perceived Stress in Marital Boredom Due to Ego_Strength and Mindfulness by Sheida Alipour, Leila Heydarinasab

    Published 2024-11-01
    “…The present study aims to explore the mediating roles of "ego-strength" and mindfulness in the relationship between perceived stress and marital boredom.Method: The present study employs a correlational and structural equation modeling approach, utilizing Amos 23 and SPSS 23 software for data analysis. The statistical population of the study comprises all married female employees from Shahed University, Iran Medical Sciences University, and Shahid Beheshti University in Tehran. …”
    Get full text
    Article
  18. 7778

    Quantifying the Impact of Dysmenorrhea Symptoms on Quality-of-Life and Access to Oral Contraceptives by Income by Rhea Choksey, Rohan K. Mangal, Thor S. Stead, Terrika Jones, Rosa Flores, Latha Ganti

    Published 2023-05-01
    “…The data was analyzed using JMP statistical software. # Results Eighty-four percent of respondents reported moderate to severe pain during menstruation. …”
    Get full text
    Article
  19. 7779

    Automated synthesis of integrated microwave LC-filters layouts with passband losses minimization by V. V. Erokhin, S. A. Zavyalov

    Published 2023-11-01
    “…The CAD is developed in MathCAD software based on the proposed technique. The use of CAD made it possible to reduce the engineering time for integrated LC-filters to tens of minutes, reduce the filters passband losses by 1,1–2,7 dB and increase the AFCs gain slope by 47–267 dB/dec.…”
    Get full text
    Article
  20. 7780

    LLM-Guided Crowdsourced Test Report Clustering by Ying Li, Ye Zhong, Lijuan Yang, Yanbo Wang, Penghua Zhu

    Published 2025-01-01
    “…In the future, this method is expected to be widely used in the process of software testing and maintenance, and further promote technological progress.…”
    Get full text
    Article