Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
8521
Programming assistance based on Naeural AI OS Platform
Published 2024-12-01“…Totuși, acest lucru necesită o infrastructură complexă care să deservească un model de inteligență artificială, atât în ceea ce privește resursele hardware de înaltă performanță, cât și în ceea ce privește întreținerea necesară pentru menținerea acestora și a componentelor software aferente. Prezenta lucrare propune proiectarea și implementarea CodeXpand, un serviciu online de asistență pentru programare prin valorificarea capacităților sistemului de operare Naeural AI OS, care oferă o infrastructură completă pentru formarea și deservirea modelelor de inteligență artificială într-o comunitate globală descentralizată bazată pe o economie a jetoanelor. …”
Get full text
Article -
8522
The Prevalence of Restless Legs Syndrome in Patients with Migraine: A Systematic Review and Meta-Analysis
Published 2020-01-01“…The heterogeneity of the studies was assessed using the I2 index, and the data analysis was performed using the Comprehensive Meta-Analysis software. Results. Analysis was conducted on the reported results of the final 12 articles with the total sample size of 15196. …”
Get full text
Article -
8523
Effect of long-term exercise on circulating ghrelin in overweight and obese individuals: a systematic review and meta-analysis
Published 2025-01-01“…The quality of the studies was assessed according to the Cochrane Handbook standards, and data analysis for ghrelin, BMI, and weight was performed using RevMan 5.4 and Stata 16.0 software. A total of 13 interventions involving 944 participants were included to systematically investigate the regulatory effects of exercise on ghrelin levels in obese and overweight individuals. …”
Get full text
Article -
8524
A study on the global patterns in the design and development of ventricular assist devices: a visualization approach
Published 2025-01-01“…Data analysis was done using Biblioshiny which is an R-based software and is part of RStudio and Microsoft Excel to analyze collaboration between countries, authors, keyword analysis, trend topics, and evolution of various themes related to this study.ResultsA total of 489 published documents were analyzed, and these documents were from 158 different sources and 1,753 authors. …”
Get full text
Article -
8525
Predicting Hope in Mothers of Intellectually Disabled Children Through Emotional, Psychological and Spiritual Factors
Published 2024-11-01“…Data were analyzed using SPSS software version 26, employing Pearson’s correlation test and multiple regression analysis. …”
Get full text
Article -
8526
Exploring the relationship between facilitating factors and adherence to nursing ethical standards
Published 2025-01-01“…Data analysis was conducted using SPSS software version 23, employing t-tests, ANOVA, Pearson’s correlation coefficient, and multiple linear regression. …”
Get full text
Article -
8527
Effect of 3D Printing Orientation on the Accuracy and Surface Roughness of Polycarbonate Samples
Published 2024-12-01“…Accuracy was assessed using a GOM Scan 1 scanner and GOM Inspect 2019 software, focusing on 3D deviations and dimensional and geometric deviations (form, position, and orientation, which have not yet been analyzed in similar studies and may limit the usage of the printed elements). …”
Get full text
Article -
8528
Spatial assessment of land use and land cover change impacts on groundwater recharge and groundwater level: A case study of the Hat Yai basin
Published 2025-02-01“…The MOLUSCE (plug-in QGIS) software was used to analyze land use and land cover changes. …”
Get full text
Article -
8529
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
8530
Regulatory mechanism analysis of signal transduction genes during rapeseed (Brassica napus L.) germination under aluminum stress using WGCNA combination with QTL
Published 2025-01-01“…On the 3rd, 5th, and 7th day after treatment, the root tissue was collected for transcriptome sequencing. Utilizing MapMan software, the genes showing differential expression in S and R lines were assigned to the aluminum stress signaling pathway, resulting in the identification of 1036 genes. …”
Get full text
Article -
8531
Mineral composition of bread wheat lines with introgressions of alien genetic material
Published 2023-04-01“…The data were processed using the Statistica 10.0 and MS Excel software packages.Results and conclusion. The content of minerals in the grain of Triticum spp. was higher than in T. aestivum cultivars (the twoyear average difference was 1,02 to 2,13-fold, depending on the studied mineral). …”
Get full text
Article -
8532
OCF Bridging Techniques for UWB/LoRa IoT Ecosystems
Published 2022-01-01“…The OCF has developed not only its own standard but also an open source software framework called IoTivity for efficient implementation of IoT systems. …”
Get full text
Article -
8533
Digitized thermo-responsive shape memory matrix band for tooth restorations
Published 2025-01-01“…The permanent shape could be designed and customized in software or retrieved from imaging database collected from large general population. …”
Get full text
Article -
8534
Spiking Neural Networks for Energy-Efficient Acoustic Emission-Based Monitoring
Published 2024-01-01“…Therefore, we aim at combining the superior performances in ToA identification enabled by the WT operator with the unique energy saving disclosed by spiking hardware and software. Experimental tests executed on a metallic plate structure demonstrated that WT combined with SNN can achieve high precision (median values less than 5 cm) in ToA estimation and AE source localization even in the presence of relevant noise (signal-to-noise ratio down to 2 dB), while its deployment on dedicated neuromorphic architectures can reduce by six orders of magnitude the power expenditure per inference when compared to standard convolutional architectures.…”
Get full text
Article -
8535
Construction of a nomogram model to predict the risk of retinopathy of prematurity reactivate after intravitreal anti-vascular endothelial growth factor therapy: a retrospective st...
Published 2025-01-01“…A nomogram model was constructed using R software and validated using the validation set. The discrimination, calibration, and clinical net benefit of the model were evaluated using the receiver operating characteristic curve (ROC curve), calibration curve, and decision curve analysis, respectively.ResultsMultivariable logistic regression analysis showed that the number of red blood cell transfusions, use of pulmonary surfactant (PS) 2 times or more, and preoperative fundus hemorrhage were independent risk factors for ROP reactivate (P < 0.05). …”
Get full text
Article -
8536
Rib Spalling 3D Model for Soft Coal Seam Faces with Large Mining Height in Protective Seam Mining: Theoretical and Numerical Analyses
Published 2020-01-01“…Besides, a self-developed three-dimensional numerical calculation software RFPA3D (Realistic Fracture Process 3D Analysis), which considered the rock heterogeneity, was used to reproduce a weak triangular prism’s progressive failure process. …”
Get full text
Article -
8537
Digitization of military records in Ukraine: legal problems and ways to solve them
Published 2024-03-01“…The need to develop a software and hardware complex for the functioning of the “Electronic Office of the Defender” and legal regulation of its work has been emphasized. …”
Get full text
Article -
8538
Disastrous Mechanism of Water Discharge in Abandoned Gob above the Stope in Mining Extra-Thick Coal Seam
Published 2021-01-01“…With the mining geological conditions of the 8202 working face in the Tongxin coal mine as references, the disastrous mechanism of water discharge in the abandoned gob above the stope in the mining extra-thick coal seam is researched by numerical simulation with the UDEC numerical software, and the research results are obtained. The water in the overlying gob percolates through the mining-induced fractures in the higher key layer forming a “shower” seepage pattern. …”
Get full text
Article -
8539
Modulation Instability and Dynamical Analysis of New Abundant Closed-Form Solutions of the Modified Korteweg–de Vries–Zakharov–Kuznetsov Model With Truncated M-Fractional Derivativ...
Published 2024-01-01“…Under the condition of parameters, the obtained solutions exhibit hyperbolic, trigonometric, and rational functions with free parameters. Using the Maple software, we present three-dimensional (3D) plots with density plots and two-dimensional (2D) graphical representations for appropriate values of the free parameters. …”
Get full text
Article -
8540
METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA
Published 2017-01-01“…The lack of specialized software systems, the knowledge-intensiveness of algorithms of calculation needed for the solution of operational tasks determine the predominant application of the intuitive approach. …”
Get full text
Article