-
441
-
442
Calculation of a heat exchanger using heat pipes in the exhaust air heat recovery system
Published 2024-01-01“…The research is based on methods of thermodynamic analysis, full-scale and computational modeling of processes and objects of refrigeration and cryogenic technology, air conditioning and life support systems. …”
Get full text
Article -
443
Implementation and Performance Evaluation of Quantum Machine Learning Algorithms for Binary Classification
Published 2024-11-01“…In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. …”
Get full text
Article -
444
Preclinical Positron Emission Tomographic Imaging of Acute Hyperoxia Therapy of Chronic Hypoxia during Pregnancy
Published 2015-07-01“…Hypoxic placentas and fetuses retained more 64 Cu-ATSM compared to normoxic placentas and fetuses. Herein we report first-in-mouse PET imaging of fetuses employing both tracers [ 18 F]FDG (metabolism) and 64 Cu-ATSM (hypoxia). [ 18 F]FDG PET/CT imaging allowed clear visualization of placental-fetal structures and supported quantification of tracer uptake, making this a sensitive tool for monitoring placental function in preclinical rodent models. …”
Get full text
Article -
445
stormTB: a web-based simulator of a murine minimal-PBPK model for anti-tuberculosis treatments
Published 2025-01-01Get full text
Article -
446
Low Testosterone Level and Mortality Risk in Patients With Prostate Cancer: A Post‐Randomization Analysis
Published 2025-08-01Get full text
Article -
447
A robust implicit Jungck iterative scheme: stability, data dependency, and applications to nonlinear integral equations
Published 2025-06-01“…This work addresses key limitations in previous studies (Alam, Rohen in J. …”
Get full text
Article -
448
RUL prediction method based on cross-view hybrid network model
Published 2025-01-01Get full text
Article -
449
Impact of Y chromosome loss on the risk of Parkinson's disease and progressionResearch in context
Published 2025-07-01“…C.R.S.'s work is supported by NIH grants NINDS/NIA R01NS115144, the U.S. …”
Get full text
Article -
450
Coarse-Grained Hawkes Processes
Published 2025-05-01“…The introduced model, termed the coarse-grained Hawkes process, effectively captures the second-order statistical characteristics of the bin-count representation of the Hawkes process, particularly when the bin size is large relative to the typical support of the excitation kernel. Building upon this model, we develop a method for inferring the underlying Hawkes process from bin-count observations, and demonstrate through simulation studies that the proposed approach performs comparably to, or even surpasses, existing techniques, while maintaining computational efficiency in parameter estimation.…”
Get full text
Article -
451
Partnerships as Professional Learning: Early Childhood Teaching Assistants’ Role Development and Navigation of Challenges Within a Culturally Responsive Robotics Program
Published 2025-04-01“…Accordingly, early childhood educators both require substantial support when integrating culturally responsive computing into curriculum and instruction and offer valuable perspectives on emerging practices. …”
Get full text
Article -
452
Organising general practice for care homes: a multi-method study
Published 2025-04-01“…NHS England funded the Vanguard initiative (2015–8) to identify and support innovative ways of working with care homes in five areas. …”
Get full text
Article -
453
Advancements in Multi-Objective Optimization for Planning and Management of Multi-Energy Systems
Published 2025-06-01“…Multiple objectives are usually merged via monetization rates. The work presented herein aims to develop modelling frameworks to explore of configurations of Multi-energy systems according to non-comparable objectives and extract trade-off solutions through optimization algorithms. …”
Get full text
Article -
454
On а Recursive-Parallel Algorithm for Solving the Knapsack Problem
Published 2018-04-01“…Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. …”
Get full text
Article -
455
Optimization of management of patients with critical lower limb ischemia, allowing for risk of gangrene
Published 2019-04-01“…The obtained mathematical models should be used in the medical practice of vascular surgeons and angiologists, both in the form of software for smartphones and tablet computers, and as part of decision support systems, including telemedicine systems.…”
Get full text
Article -
456
Novel insights into post-myocardial infarction cardiac remodeling through algorithmic detection of cell-type composition shifts.
Published 2025-07-01“…RNAscope validation supported the composition-aware findings for key genes. …”
Get full text
Article -
457
-
458
-
459
Are queries and keys always relevant? A case study on transformer wave functions
Published 2025-01-01“…Specifically, we perform numerical simulations on the two-dimensional J _1 – J _2 Heisenberg model, a common benchmark in the field of quantum many-body systems on lattice. By comparing the performance of standard attention mechanisms with a simplified version that excludes queries and keys, relying solely on positions, we achieve competitive results while reducing computational cost and parameter usage. …”
Get full text
Article -
460
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article