Showing 6,301 - 6,320 results of 7,650 for search 'Comali~', query time: 2.35s Refine Results
  1. 6301

    Application of Electrical Resistivity Tomography Technique for Characterizing Leakage Problem in Abu Baara Earth Dam, Syria by Walid Al-Fares

    Published 2014-01-01
    “…Several subsurface structural anomalies were identified within the fractured bedrock, most of which are associated with probable karstic cavities, voids, and discontinuity features developed within the carbonates rocks. …”
    Get full text
    Article
  2. 6302

    Malignant Peripheral Nerve Sheath Tumor: MRI and CT Findings by K. O. Kragha

    Published 2015-01-01
    “…The diagnosis of MPNST is extremely difficult due to the lack of (1) conclusive immunohistochemistry or unique chromosomal anomaly, (2) universal distinctive histopathology, and (3) clinical criteria. …”
    Get full text
    Article
  3. 6303

    Monstruos, prodigios y maravillas en los viajes de Pero Tafur by Pablo Castro Hernández

    Published 2016-12-01
    “…The monsters reflect a disorder in nature, representing the low and evil. They are an anomaly that escapes from traditional forms, expressing excessive, huge and grotesque characteristics. …”
    Get full text
    Article
  4. 6304

    Anatomical Considerations of Costal Abnormalities with its Clinical Significance by B. F. Jazeela, Meera Jacob, Ashwini Shetty

    Published 2024-01-01
    “…Clinicians and radiologists must be conversant with how these variances look on imaging. These anomalies highlight the early organogenesis changes that may be associated with stillbirths, cancer, and other defects.…”
    Get full text
    Article
  5. 6305

    Image recognition technology for bituminous concrete reservoir panel cracks based on deep learning. by Kai Hu, Yang Ling, Jie Liu

    Published 2025-01-01
    “…This study introduces a novel deep learning-based anomaly model for effective crack detection. A large dataset of panel images was collected and processed using denoising, standardization, and data augmentation techniques, with crack areas labeled via LabelImg software. …”
    Get full text
    Article
  6. 6306

    Financial Risk Avoidance Based on the Sensor Network and Edge Computing by Yong Yu, Xiaoguo Yin

    Published 2022-01-01
    “…In order to improve the effect of financial risk aversion, this paper studies the financial risk aversion system combined with the edge computing method of the sensor network and proposes a sensor data anomaly detection algorithm based on the offset distance. …”
    Get full text
    Article
  7. 6307

    Gallbladder Agenesis with Refractory Choledocholithiasis by Jamie Tjaden, Kevin Patel, Aziz Aadam

    Published 2015-01-01
    “…Congenital agenesis of the gallbladder is a rare anomaly which is usually asymptomatic and found incidentally. …”
    Get full text
    Article
  8. 6308

    Rumi and Adding "-i" Suffixes to Words Ending in the [i] Vowel by Hamidreza Tvakkoli

    Published 2022-06-01
    “…In this way, he places a phonetic anomaly in the realm of his aesthetic norms. On the other hand, this stylistic distinctive creates a sign indicating the uniqueness of his experiences and the moments he talks about. …”
    Get full text
    Article
  9. 6309

    Runtime verification approach for DoS attack detection in edge servers by Bin YU, Nan ZHANG, Xu LU, Zhenhua DUAN, Cong TIAN

    Published 2021-09-01
    “…Aiming at the DoS (denial of service) attacks against edge servers in an edge computing system, a parallel runtime verification approach for DoS attack detection was proposed.First, PPTL (propositional projection temporal logic) formulas were utilized to formally describe expected behaviors of an edge server and DoS attack characteristics.Then, for the PPTL formulas to be verified, a parallel runtime verification framework was adopted to make use of the computing and storage resources of an edge server to conduct anomaly detection and misuse detection.The proposed attack detection approach was performed for an actual P2P (peer-to-peer) network based on smart parking system using edge computing which was supposed to suffer from a DoS attack.Experiments show that the proposed method can accurately and efficiently identify abnormal behaviors of edge servers and types of DoS attacks.…”
    Get full text
    Article
  10. 6310

    A discussion of anesthesiologically relevant aspects of Klinefelter syndrome -a case report- by Christine Gaik, Katharina Politt

    Published 2025-02-01
    “…Background Klinefelter syndrome (KS), usually the 47,XXY karyotype, is the most common sex chromosome anomaly in males. However, many cases remain undiagnosed because the clinical presentation is highly variable and physicians are not sufficiently trained to assess for this condition. …”
    Get full text
    Article
  11. 6311

    Les structures pastorales des massifs du Sancy et du Cézallier (Puy-de-Dôme, France) by Frédéric Surmely, Julien le Junter

    Published 2017-11-01
    “…In the Volcanic ranges of the Sancy and the Cézalier structures of a very unsusal type can be found in strong concentrations, they are little known at this date and rare in neighbouring ranges. …”
    Get full text
    Article
  12. 6312

    JEREMIAH 51:15-19 (MT): by M D Terblanche

    Published 2018-12-01
    “… The oracles against Babylon seem to be an anomaly in the Book of Jeremiah. The doxology in Jeremiah 51:15-19 (MT) does, however, serve as a link between these oracles and the remainder of the book of Jeremiah. …”
    Get full text
    Article
  13. 6313

    Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization by Khandakar Md Shafin, Saha Reno

    Published 2024-01-01
    “…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
    Get full text
    Article
  14. 6314

    Infância e errância: imagens da criança abandonada na ficção brasileira by Licia Soares de Souza

    Published 2015-01-01
    “…Finally, we conclude that Amado‟s work indicates the anomalies of a society of exclusion that allows children to be abandoned in the streets, as if he was predicting that this situation would get worse if the country did not apply policies of inclusion with revenue sharing, aiming at the quality of life of the population.…”
    Get full text
    Article
  15. 6315

    A Wandering Abdominal Mass in a Neonate: An Enteric Duplication Cyst Mimicking an Ovarian Cyst by Shigeo Iijima

    Published 2017-01-01
    “…Enteric duplication cysts are rare congenital anomalies that are prenatally diagnosed through antenatal ultrasonography (US). …”
    Get full text
    Article
  16. 6316

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  17. 6317

    Anaesthetic management of infant with occipital encephalocele associated with Arnold Chiari III malformation - A Case Report by Vandana Patilbuwa Pakhare, K. Naga Sri Sowmya, Mohammed Mohsin Ali, Reshma Sultana, Doli Suresh Chander

    Published 2025-01-01
    “…Meningoencephalocele is a congenital anomaly wherein meninges, brain, and cerebrospinal fluid (CSF) are herniated through defect in the skull. …”
    Get full text
    Article
  18. 6318

    Protocol for genetic analysis of population-scale ultra-low-depth sequencing data by Jingyu Zeng, Linxuan Li, Ying Lin, Xianmei Lan, Xinyi Zhang, Yingying Wang, Mingzhi Liao, Xin Jin, Huanhuan Zhu

    Published 2025-03-01
    “…Summary: Non-invasive prenatal testing (NIPT) not only enables the detection of chromosomal anomalies in fetuses but also generates vast amounts of ultra-low-depth sequencing data, which can be leveraged for population genomic studies. …”
    Get full text
    Article
  19. 6319

    Caliber-Persistent Artery by Sabrina Araújo Pinho Costa, Marcelo Martinson Ruiz, Shajadi Pardo Kaba, Giovanna Piacenza Florezi, Celso Augusto Lemos Júnior, Andréa Lusvarghi Witzel

    Published 2015-01-01
    “…Caliber-persistent artery (CPLA) of the lip is a common vascular anomaly in which a main arterial branch extends to the surface of the mucous tissue with no reduction in its diameter. …”
    Get full text
    Article
  20. 6320

    Anomalous Right Subclavian Artery-Esophageal Fistulae by Courtney Brooke Shires, Michael J. Rohrer

    Published 2018-01-01
    “…An aberrant right subclavian artery (ARSA) is the most common aortic arch anomaly, but only 19 previous cases of ARSA-esophageal fistula have been reported. …”
    Get full text
    Article