Suggested Topics within your search.
Suggested Topics within your search.
-
1221
The accuracy of a novel stunting risk detection application based on nutrition and sanitation indicators in children aged under five years
Published 2025-05-01“…Methods This cross-sectional study was conducted between June and September 2023 and involved 316 mother-child pairs selected by simple random sampling from urban (n = 244) and rural (n = 72) areas in Bogor, West Java Province, Indonesia. …”
Get full text
Article -
1222
-
1223
Design of Smart Plant Electrical Signal Monitoring System for Indoor Farming
Published 2025-01-01“…Calibration for this system needs a function generator. The calibration result is analyzed using statistical methods such as MAPE. …”
Get full text
Article -
1224
-
1225
Intra action review of the cholera outbreak response in Kadoma city, Zimbabwe, 2024
Published 2025-08-01“…The working groups covered eight response pillars aligned to the five core functions of the Incident Management System (IMS). …”
Get full text
Article -
1226
The role of oxygenation in kidney and liver machine perfusion
Published 2023-12-01“…An analysis of literature sources in English and Russian from 2009 to 2023 on this topic was performed in the databases PubMed, MEDLINE, Google Scholar. …”
Get full text
Article -
1227
Comparative analysis of anthocyanin content in various tomato samples in connection with breeding
Published 2022-12-01“…It has been shown that selection for high content of anthocyanins can be performed at various stages of fruit ripening (large ripe fruit, blangetongue, biological ripeness), selecting the most intense colouring. …”
Get full text
Article -
1228
Lightweight deep learning system for automated bone age assessment in Chinese children: enhancing clinical efficiency and diagnostic accuracy
Published 2025-07-01“…In the first stage, the YOLOv8 algorithm precisely localizes 13 key epiphyses in hand radiographs, achieving a mean Average Precision (mAP) of 99.5% at Intersection over Union (IoU) = 0.5 and 94.0% within IoU 0.5–0.95, demonstrating robust detection performance. The second stage employs a modified EfficientNetB3 architecture for fine-grained epiphyseal grade classification, enhanced by the Rectified Adam (RAdam) optimizer and a composite loss function combining center loss and weighted cross-entropy to mitigate class imbalance. …”
Get full text
Article -
1229
Habitat and Predator Influences on the Spatial Ecology of Nine-Banded Armadillos
Published 2025-04-01Get full text
Article -
1230
Memory Mining and Spatial Transformation of Daily Landscape in Renewal of Tianjin Old City
Published 2025-03-01“…Three novels by renowned Tianjin author Feng Jicai — Yin-Yang Eight Trigams, Three-Inch Golden Lotus, and Faces in the Crowd — are selected as primary data sources. Through text mining and semantic sentiment analysis, these works reveal three distinct emotional characteristics of daily landscapes. 1) Bustling Scenes: Positive emotional spaces, such as religious sites and venues associated with traditional artisans and eccentric figures, reflect the region’s commitment to preserving traditions and fostering a sense of collective enjoyment. …”
Get full text
Article -
1231
A dataset of hidden small non-coding RNA in the testis of heat-stressed models revealed by Pandora-seq
Published 2024-07-01“…Subsequently, we conducted functional enrichment analysis on the potential predicted target genes of differentially expressed miRNAs and tsRNAs. …”
Get full text
Article -
1232
A long-term reconstruction of a global photosynthesis proxy over 1982–2023
Published 2025-03-01Get full text
Article -
1233
-
1234
-
1235
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
1236
In situ, modeled, and earth observation monitoring of surface water availability in West African rangelands
Published 2025-06-01Get full text
Article -
1237
Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications
Published 2025-05-01“…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
Get full text
Article -
1238
ANALISIS STAKEHOLDERS DALAM PENGEMBANGAN PROGRAM DIKLAT DI BALAI DIKLAT APARATUR KEMENTERIAN KELAUTAN DAN PERIKANAN STAKEHOLDERS ANALYSIS IN DEVELOPMENT OF TRAINING PROGRAM ON TRAI...
Published 2019-10-01“…Data retrieval is done by means of field research through interviews with several informants. The selection of informants is based on purposive sampling technique, namely the technique of selecting informants to get data sources based on people who are considered to know the best about what the researchers expect. …”
Get full text
Article -
1239
ANALISIS STAKEHOLDERS DALAM PENGEMBANGAN PROGRAM DIKLAT DI BALAI DIKLAT APARATUR KEMENTERIAN KELAUTAN DAN PERIKANAN STAKEHOLDERS ANALYSIS IN DEVELOPMENT OF TRAINING PROGRAM ON TRAI...
Published 2019-10-01“…Data retrieval is done by means of field research through interviews with several informants. The selection of informants is based on purposive sampling technique, namely the technique of selecting informants to get data sources based on people who are considered to know the best about what the researchers expect. …”
Get full text
Article -
1240
Re-Infection Outcomes Following One- And Two-Stage Surgical Revision of Infected Knee Prosthesis: A Systematic Review and Meta-Analysis.
Published 2016-01-01“…<h4>Design</h4>Systematic review and meta-analysis.<h4>Data sources</h4>MEDLINE, EMBASE, Web of Science, Cochrane Library, reference lists of relevant studies to August 2015, and correspondence with investigators.…”
Get full text
Article