Suggested Topics within your search.
Suggested Topics within your search.
-
4981
Hand-Related Activities of Daily Living Challenges Among Individuals With Diabetic Peripheral Neuropathy: A Scoping Review
Published 2025-06-01“…This review highlights the need for comprehensive assessments that address not only impairments, but also activity limitations and participation restrictions, to capture the multifaceted challenges of DPN. Developing targeted assessments tailored to the specific needs of individuals with DPN is essential for improving intervention strategies and overall quality of care.…”
Get full text
Article -
4982
Identification and characterization of alternative homologs of histidinol-phosphate phosphatase in Pseudomonas aeruginosa
Published 2025-07-01“…PA0335 and PA3255 could be used as targets for P. aeruginosa infection treatment separately or synergistically due to their participates in histidine auxotrophy, full virulence and obvious antibiotics resistance in P. aeruginosa. …”
Get full text
Article -
4983
A Graph-Based Learning Framework for Compiler Loop Auto-Vectorization
Published 2025-01-01“…Modern compilers use vectorization techniques to exploit the SIMD capability, by detecting data parallelism in scalar source code and transforming a group of scalar instructions into vector-based instructions. …”
Get full text
Article -
4984
Representativity studies of GEN-III large cores to ZPR experiments with respect to nuclear data
Published 2025-01-01“…This paper presents the methodology and some results of evaluated representativity factors between ZPR experiments and a Gen-III+ target core issued from the UAM benchmark at different scales and their evolution throughout the fuel cycle life, using the industrial state-of-the-art code COCAGNE. …”
Get full text
Article -
4985
The DFA/DFT‐based hacking techniques and countermeasures: Case study of the 32‐bit AES encryption crypto‐core
Published 2021-03-01“…On the other hand, embedded systems used in critical applications execute security‐critical commands and collect sensitive data protected by cryptographic keys and authentication codes. The data and the unauthorised access of these embedded devices is an obvious target for attackers in order to obtain control or extract internal data. …”
Get full text
Article -
4986
Three-dimensional assessment of heavy metal contamination in soil affected by urbanization at the urban-rural interface of Chengdu
Published 2025-06-01“…A combination of geochemical assessments, including the Ratio of Secondary Phase to Primary Phase (RSP) and the Risk Assessment Code (RAC), was used to evaluate the ecological risks posed by these metals. …”
Get full text
Article -
4987
Factors that influence interprofessional implementation of trauma‐informed care in the emergency department
Published 2023-08-01“…Interview responses were transcribed, coded using Atlas software, and analyzed using thematic analysis. …”
Get full text
Article -
4988
Hyperparameter optimisation in deep learning from ensemble methods: applications to proton structure
Published 2025-01-01“…An algorithmic, objective determination of hyperparameters demands the introduction of dedicated target metrics, different from those adopted for the model training. …”
Get full text
Article -
4989
THE IMAGE OF THE WORLD AND THE IMAGE OF THE HUMAN: A.S. BYATT’S “ANGELS AND INSECTS” AS AN ARTISTIC WHOLE
Published 2021-12-01“…Byatt herself saw in these novellas “two linked historical novellas”, and analysis makes it possible to make sure that the novellas are dialogically open and complement to each other and are mutually reflected in each other. …”
Get full text
Article -
4990
MHD Free Convection in an Enclosure Loaded with Nanofluid and Partially Cross-heated
Published 2025-05-01“…The application of the Darcy-Brinkman model makes it possible to simulate the transfer of momentum under the effect of a horizontal magnetic field. …”
Get full text
Article -
4991
How to Improve Usability in Open-Source Software Projects? An Analysis of Evaluation Techniques Through a Multiple Case Study
Published 2025-01-01“…However, open-source communities still need standardized processes to ensure software quality, and their characteristics make it challenging to adopt many usability techniques from human–computer interaction directly. …”
Get full text
Article -
4992
A PRISMA systematic review through time on predictive musculoskeletal simulations
Published 2025-07-01“…To this end, we share a list of works open-sourcing their codes.…”
Get full text
Article -
4993
Examining privacy concerns and conversations before, during, and after the onset of the COVID-19 pandemic: an analysis of r/privacy
Published 2025-03-01“…Our research design included a mixed-method comparative analysis of 540 coded r/privacy posts from three time periods: immediately before the pandemic, during the emergence of COVID-19, and two years after the onset of the pandemic. …”
Get full text
Article -
4994
Appraising Discourse Content of EFL Classrooms Through the Lens of Bakhtin’s Dialogic Discourse Pattern
Published 2019-01-01“…The functions of each interaction were transcribed verbatim and then coded to uncover the initiation-response-feedback (IRF) patterns. …”
Get full text
Article -
4995
Resistive Collapse of 2D Nonrotating Magnetized Isothermal Toroids: Formation of Pseudodisks
Published 2025-01-01“…., now with explicit nonideal MHD (ohmic diffusivity η ) and higher resolution using a code able to cover a broader range of the magnetization parameter H _0 . …”
Get full text
Article -
4996
Leveraging disruptive technologies for food security: A systematic review on agricultural supply chain resilience to climate change
Published 2025-01-01“…A total of 65 selected papers were coded and analyzed according to technology type, country, commodity, and challenges faced. …”
Get full text
Article -
4997
AIS-Based Vessel Trajectory Compression: A Systematic Review and Software Development
Published 2024-01-01“…The principles and pseudo-codes of these methods will be provided and discussed in detail. …”
Get full text
Article -
4998
Multi-Objective Majority–Minority Cellular Automata Algorithm for Global and Engineering Design Optimization
Published 2024-09-01“…The MOMmCAA was implemented in MATLAB and its source code can be consulted in GitHub.…”
Get full text
Article -
4999
MHD darcy-forchheimer flow of SWCNT-H2O nanofluid over a porous stretching sheet
Published 2025-03-01“…Single walled carbon nanotubes exhibit unique electronic properties that make them ideal for miniaturizing electronics and serving as excellent conductors in various nanotechnological applications. …”
Get full text
Article -
5000
A Novel Rapid Design Framework for Tooth Profile of Double-Circular-Arc Common-Tangent Flexspline in Harmonic Reducers
Published 2025-06-01“…However, the numerous design parameters and the lack of a unified design standard for the flexspline tooth profile make it challenging to accurately determine these parameters. …”
Get full text
Article