Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
17181
-
17182
Associations between smartphone GPS data and changes in psychological health and burden outcomes among family caregivers and patients with advanced cancer: an exploratory longitudi...
Published 2025-04-01“…Participants completed self-report measures (PROs) of anxiety and depressive symptoms (Hospital Anxiety and Depression Scale [HADS]), mental health (PROMIS Mental Health), and caregiver burden (Montgomery-Borgatta Caregiver Burden scale) at baseline and every 6 weeks for 24 weeks. After pre-processing raw GPS data into daily GPS features (e.g., time spent at home, distance traveled/day), computing biweekly moving averages and standard deviations, and conducting a principal components analysis (PCA) of the resulting variables, within-person regression models were used to assess associations between changes in PRO measures and changes in PCA scores, with adjusted-R2 as the measure of effect size (small = 0.02, medium = 0.13, large = 0.26). …”
Get full text
Article -
17183
The Impact of Vaccination on Disease Course and Outcome in Intensive Care Patients With COVID-19
Published 2023-02-01“…After the anonymization of the personal data of patients and the distribution of patients into comparison groups, the obtained information was processed by standard means of mathematical statistics using the R-free software computing environment. …”
Get full text
Article -
17184
Intraoperative Axillary Artery Injury as a Complication of Reverse Total Shoulder Arthroplasty
Published 2025-01-01“…There is a need for more extensive coverage of this problem in order to prevent similar situations in the future.THE AIM of this publication is to present a clinical case of intraoperative axillary artery injury in the process of reverse shoulder arthroplasty, and the medium term result of surgical treatment after replacement of the artery defect with a synthetic graft.MATERIAL AND METHODS We present a rare clinical case of intraoperative axillary artery injury in the process of reverse shoulder arthroplasty. …”
Get full text
Article -
17185
Towards a self-applied, mobile-based geolocated exposure therapy software for anxiety disorders: SyMptOMS-ET app
Published 2024-10-01“…Methods A team of computer scientists and psychologists developed the ET Component for in-vivo ET using geolocation-based technology, following the process-centred design methodology. …”
Get full text
Article -
17186
-
17187
Sub-nanosecond polarization switching with anomalous kinetics in vdW ferroelectric WTe2
Published 2025-08-01Get full text
Article -
17188
Research of authentication techniques for the Internet of things
Published 2020-07-01“…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
Get full text
Article -
17189
High-purity single-photon generation based on cavity QED
Published 2025-03-01“…Our scheme can contribute to developing distributed quantum computation or quantum communication with high accuracy.…”
Get full text
Article -
17190
Using a WebCT to Develop a Research Skills Module
Published 2003-05-01“…This paper outlines the process and experience of creating and administering the sessions through WebCT and summarizes student feedback and lessons learned. …”
Get full text
Article -
17191
Research and application on megawatt level intelligent fracturing pump system in coal mine
Published 2025-05-01“…The research included: Development of high-strength, erosion-resistant martensitic precipitation hardening stainless steel suitable for extreme conditions with large flow, ultra-high pressure, and sand-mixed media, along with ultra-high pressure self-reinforcing treatment to enhance the fatigue life of the hydraulic ends of fracturing pumps; Investigation of critical reliability technologies, including high-strength welding for alloy steel, high-load-bearing, high-power-to-weight ratio gear transmission technology, and wear-resistant friction pairs of aluminum bronze alloy-cast iron, to ensure the reliability of the transmission system under high-power conditions; Creation of a high-durability metal plunger-combination seal fracturing fluid sealing pair, with the application of computer simulation technologies such as virtual prototyping, FEA, CFD, and hydraulic system simulation to optimize the structure, performance, and reliability of the fracturing pump’s fluid end suction and discharge systems; Mastery of technologies such as low-frequency variable flow sealing for deep boreholes, automatic identification of coal and rock layer fracturing, and cyclic fracturing control, enabling intelligent control throughout the fracturing process. …”
Get full text
Article -
17192
Turbo Warrants under Hybrid Stochastic and Local Volatility
Published 2014-01-01“…The model consists of the constant elasticity of variance model incorporated by a fast fluctuating Ornstein-Uhlenbeck process for stochastic volatility. The sensitive structure of the turbo warrant price is revealed by asymptotic analysis and numerical computation based on the observation that the elasticity of variance controls leverage effects and plays an important role in characterizing various phases of volatile markets.…”
Get full text
Article -
17193
Adaptive Sliding Mode Control for a Class of Manipulator Systems with Output Constraint
Published 2021-01-01Get full text
Article -
17194
On the Relation between Phase-Type Distributions and Positive Systems
Published 2015-01-01Get full text
Article -
17195
-
17196
A Hidden Chaotic Attractor with an Independent Amplitude-Frequency Controller
Published 2022-01-01Get full text
Article -
17197
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space
Published 2021-12-01Get full text
Article -
17198
INTEGRATED APPROACH TO THE ORGANIZATION OF ONLINE LEARNING IN THE MODERN UNIVERSITY
Published 2016-05-01Get full text
Article -
17199
AI-Powered Spectral Imaging for Virtual Pathology Staining
Published 2025-06-01“…First, the rise in whole slide imaging has enabled work in front of a computer screen and the integration of image processing tools to enhance diagnostics. …”
Get full text
Article -
17200
Agri-business for elderly people through the Internet
Published 2012-10-01“…The leaf business of Irodori is an example of a successful enterprise realized by connecting elderly people and local agricultural resources in a peripheral area with an aging population. In the process of developing the business, Irodori has overcome three difficulties with regard to information systems. …”
Get full text
Article