Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
4121
-
4122
Automatic Segmentation of Abdominal Aortic Aneurysm From Computed Tomography Angiography Using a Patch-Based Dilated UNet Model
Published 2025-01-01“…In a clinical setting, computed tomography angiography (CTA) is the imaging modality of choice for monitoring and/or presurgical planning of AAA patients. …”
Get full text
Article -
4123
Factors Affecting the Population of Excited Charge Transfer States in Adenine/Guanine Dinucleotides: A Joint Computational and Transient Absorption Study
Published 2024-12-01“…Our measurements reveal that in the large majority of dinucleotides, chromophore coupling is already operative in the ground state and that the charge transfer process occurs within ~120 fs. The competition among various relaxation pathways affects the quantum yields of the <i>CT</i> state formation in each dinucleotide, which are estimated to be 0.18 and 0.32 for <b>AG</b> and <b>GA</b>, respectively.…”
Get full text
Article -
4124
Intraoperative computed tomography-guided robotic needle biopsy system with real-time imaging ability and remote-center-of-motion control
Published 2025-05-01“…Objective Traditional computed tomography (CT)-guided tumor ablation procedures are often hampered by the need for repeated scans and significant radiation exposure, primarily due to challenges in manual needle insertion and the iterative realignment process. …”
Get full text
Article -
4125
Computer-Aided Intra-Operatory Positioning of an MRgHIFU Applicator Dedicated to Abdominal Thermal Therapy Using Particle Swarm Optimization
Published 2024-01-01“…New particles are generated around the best position obtained at the previous step and the process is repeated until the optimal position of the transducer is reached. …”
Get full text
Article -
4126
-
4127
Genetic and computational analysis of AKR1C4 gene rs17134592 polymorphism in breast cancer among the Bangladeshi population
Published 2025-07-01“…DNA was extracted using an organic process, followed by genotyping through the PCR-RFLP technique. …”
Get full text
Article -
4128
Importance of four-dimensional computed tomography simulation in locally advanced lung cancer radiotherapy: Impact on reducing planning target volume
Published 2022-01-01“…Four-dimensional (4D) computed tomography (CT) simulation is a useful tool for motion assessment in lung cancer radiotherapy. …”
Get full text
Article -
4129
Morphologic and Morphometric Analysis of Crista Galli for Gender Determination using Cone Beam Computed Tomography: A Cross-sectional Study
Published 2025-08-01“…Introduction: Gender determination is a key process in forensic investigations. The Crista Galli (CG) is a significant anatomical structure of the skull and a crucial endoscopic landmark in pituitary surgeries and the frontal sinus approach. …”
Get full text
Article -
4130
Microstructural evolution and hydraulic response of shale self-propped fracture using X-ray computed tomography and digital volume correlation
Published 2025-03-01“…Results indicate that the fracture aperture in the self-propped sample is significantly larger than in the unpropped sample throughout the loading process, with shale particles tending to crush rather than embedded into the matrix, thus maintaining flow pathways. …”
Get full text
Article -
4131
-
4132
VTGAN based proactive VM consolidation in cloud data centers using value and trend approaches
Published 2025-06-01Get full text
Article -
4133
-
4134
An Approach to Thermal Management and Performance Throttling for Federated Computation on a Low-Cost 3D ESP32-S3 Package Stack
Published 2025-04-01“…This approach maximizes overall efficiency while maintaining thermal safety without compromising computational power. Experimental results with up to six processors confirm the validity of the concept.…”
Get full text
Article -
4135
Progressive filling partitioning and mapping algorithm for Spark based on allocation fitness degree
Published 2017-09-01“…The job execution mechanism of Spark was analyzed,task efficiency model and Shuffle model were established,then allocation fitness degree (AFD) was defined and the optimization goal was put forward.On the basis of the model definition,the progressive filling partitioning and mapping algorithm (PFPM) was proposed.PFPM established the data distribution scheme adapting Reducers’ computing ability to decrease synchronous latency during Shuffle process and increase cluster the computing efficiency.The experiments demonstrate that PFPM could improve the rationality of workload distribution in Shuffle and optimize the execution efficiency of Spark.…”
Get full text
Article -
4136
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01“…Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. …”
Get full text
Article -
4137
Runtime Task Scheduling for FPGA-Based Embedded Systems Using Just-in-Time Bitstream Prefetching
Published 2024-01-01Get full text
Article -
4138
CONCEPTUAL FRAMEWORK OF ANALYSIS OF INFORMATION SECURITY MODELS OF CLOUD SYSTEMS OF THE CLASS «INFRASTRUCTURE AS A SERVICE»
Published 2019-10-01“…A process based on the role approach for the synthesis of information security models of cloud computing systems based on applied system and threat models is described; the result is a security model, expressed, for example, in recommendations for improving information security or containing elements of the security configuration. …”
Get full text
Article -
4139
Energy-efficient optimization strategy based on elastic data migration in big data streaming platform
Published 2024-02-01“…Focused on the problem that the stream computing platform was suffering from the high energy consumption and low efficiency due to the lack of consideration for energy efficiency in designing process, an energy-efficient optimization strategy based on elastic data migration in big data streaming platform (EEDM-BDSP) was proposed.Firstly, models of the load prediction and the resource judgment were set up, and the load prediction algorithm was designed, which predicted the load tendency and determine node resource occupancy, so as to find nodes of resource overload and redundancy.Secondly, models of the resource constraint and the optimal data migration were set up, and the optimal data migration algorithm was proposed, which data migration for the purpose of improving node resource utilization.Finally, model of the energy consumption was set up to calculate the energy consumption saved by the cluster after data migration.The experimental results show that the EEDM-BDSP changes node resources in the cluster can responded on time, the resource utilization and the energy-efficient are improved.…”
Get full text
Article -
4140
Design of shuffling protocol based on additive secret sharing
Published 2024-08-01Get full text
Article