-
4501
-
4502
An evaluation of Kd-Trees vs Bounding Volume Hierarchy (BVH) acceleration structures in modern CPU architectures
Published 2023-03-01“…Another well-known technique is Kd-Trees that uses binary space partitioning to adaptively subdivide space with planes. In this research, we made an up-to-date evaluation of both acceleration structures, using state-of-the-art BVH and Kd-Trees algorithms implemented in C, and found out that the Kd-Trees acceleration structure provided better performance in all defined scenarios on a modern x86 CPU architecture. …”
Get full text
Article -
4503
Metabolomics and lipidomics of plasma biomarkers for tuberculosis diagnostics using UHPLC-HRMS
Published 2025-06-01Get full text
Article -
4504
-
4505
Theoretical Model, Model Innovation, and Important Implications of DeepSeek Empowering Library Knowledge Services
Published 2025-01-01“…This study aims to provide some reference and inspiration for the research of related issues. [Results/Conclusions] The library is currently in a critical period of development for the "15th Five-Year Plan". …”
Get full text
Article -
4506
-
4507
Extraction of typical oyster pile columns in the Maowei Sea, Beibu Gulf, based on unmanned aerial vehicle laser point cloud orthophotos
Published 2025-03-01“…This study focuses on Shajing Town, Qinzhou City, Guangxi Zhuang Autonomous Region, China, as its research area. It utilizes multi-spectral image data from unmanned aerial vehicles (UAVs), light detection and ranging (LiDAR) point cloud technology, and deep learning algorithms to extract representative oyster pile columns in Maowei Sea within Beibu Gulf. …”
Get full text
Article -
4508
Drug discovery and mechanism prediction with explainable graph neural networks
Published 2025-01-01“…The unprecedented development of machine learning and deep learning algorithms has expedited the drug response prediction research. …”
Get full text
Article -
4509
A Scoping Study on Lightweight Cryptography Reviews in IoT
Published 2021-06-01“…Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. …”
Get full text
Article -
4510
A trigonometric function-based big data model for network information security control mechanisms
Published 2025-07-01“…At present, traditional encryption algorithms mainly deal with information data through the use of cryptographic theory, but with the progress of the times, there are higher requirements for the security of data for transmission. …”
Get full text
Article -
4511
-
4512
A synergistic approach using digital twins and statistical machine learning for intelligent residential energy modelling
Published 2025-07-01“…This paper proposes a framework that integrates Digital Twin (DT) systems with Artificial Intelligence (AI) algorithms for intelligent building energy consumption assessment by developing real-time virtual twin representations. …”
Get full text
Article -
4513
Different faces of the stethoscope: history, usefulness, evolution, contamination, and disinfection practices
Published 2024-11-01“…A stethoscope is a tool mainly used by physicians of various specialties in their daily work. …”
Get full text
Article -
4514
The Influence of Network Structural Preference on Link Prediction
Published 2020-01-01Get full text
Article -
4515
Non-contact tracking of shoulder bones using ultrasound and stereophotogrammetry
Published 2025-02-01Get full text
Article -
4516
Scoping review to identify and map non-pharmacological, non-surgical treatments for dysphagia following moderate-to-severe acquired brain injury
Published 2021-12-01“…Dysphagia rehabilitation is transforming from mainly compensatory strategies to the retraining of swallowing function using principles from neuroscience. …”
Get full text
Article -
4517
Artificial intelligence for diagnosing rare bone diseases: a global survey of healthcare professionals
Published 2025-07-01Get full text
Article -
4518
-
4519
Social media use to enhance children’s diets: the case of Lebanese mothers
Published 2025-12-01“…Using quantitative and qualitative research methodologies, this study relies on findings obtained from conducting a survey and a semi-structured one-on-one interview. …”
Get full text
Article -
4520
Comparative analysis of the effectiveness of three immunization strategies in controlling disease outbreaks in realistic social networks.
Published 2014-01-01“…The high incidence of emerging infectious diseases has highlighted the importance of effective immunization strategies, especially the stochastic algorithms based on local available network information. …”
Get full text
Article