-
441
Glaucoma Home Monitoring Using Online Circular Contrast Perimetry Over 6 Months: Performance and Patient Attitudes in the Developing World Setting
Published 2025-04-01“…Tung Thanh Hoang,1– 3,* Tung Quoc Mai,1,* Dung Thi Pham,1 Xuan Thi Nguyen,1 Duc-Anh Nguyen,1 Diu Thi Vu,1 Hien Thi Hoang,1 Simon Edward Skalicky4,5 1Ophthalmology Department, Hanoi Medical University, Hanoi, Vietnam; 2Ophthalmology Unit, Hanoi Medical University Hospital, Hanoi, Vietnam; 3Save Sight Institute, The University of Sydney, Sydney, NSW, Australia; 4Department of Surgery, The University of Melbourne, Melbourne, VIC, Australia; 5Glaucoma Investigation and Research Unit, the Royal Victorian Eye and Ear Hospital, Melbourne, VIC, Australia*These authors contributed equally to this workCorrespondence: Tung Thanh Hoang, Ophthalmology Department, Hanoi Medical University, No. 1 Ton That Tung str, Dong Da distr, Hanoi, 11518, Vietnam, Email tung.hoang@sydney.edu.auPurpose: Online circular contrast perimetry (OCCP) provides perimetry on any computer or tablet without additional hardware. …”
Get full text
Article -
442
The relationship of students’ emotional intelligence and the level of their readiness for online education: A contextual study on the example of university training in Saudi Arabia...
Published 2020-05-01“…The analysis of the survey data showed the variance between the measured respondents’ characteristics depending on the area of specialisation. If compared with the Sciences and Arts students, the representatives of the Faculties IT and Pharmacy demonstrated higher level skills to undertake online training, more expressed skills of self-control and computer selfefficacy. …”
Get full text
Article -
443
Predicting Insemination Outcome in Holstein Dairy Cattle using Deep Learning
Published 2024-12-01Get full text
Article -
444
-
445
SVD-Krylov–Based Structure-Preserving Techniques for Approximation of a Class of Second-Order Index-1 Descriptor Systems
Published 2025-01-01“…This work is aimed at deriving a computationally efficient approach to approximate the second-order Index-1 descriptor systems without exploiting the fundamental structure of the systems, which ensures both the accuracy of the approximation and the feasibility of computation time. …”
Get full text
Article -
446
SOA Services Identification and Design Methods From Business Models: A Systematic Literature Review
Published 2025-01-01Get full text
Article -
447
Development of educational robotics: Problems and prospects
Published 2022-02-01“…The most significant problems of integrating educational robotics into school and additional education are highlighted: weak material base for organising classes; absence or low qualification of existing teachers; lack of a clear systemic plan for the implementation of robotics in the education of schoolchildren; lack of educational and methodological support. As strategies for the provision of education with teachers in educational robotics, the following are proposed: introduction into the practice of professional training of teachers in the higher education system of the profile “Educational Robotics”; implementation of professional retraining under the “Educational Robotics” programme for teachers of computer science, mathematics, technology, physics and primary education; attracting students –future teachers to receive additional education at the stage of study at the university in the framework of professional training “Pedagogy of Additional Education: Robotics”.Scientific novelty. …”
Get full text
Article -
448
Point Cloud Completion of Occluded Corn with a 3D Positional Gated Multilayer Perceptron and Prior Shape Encoder
Published 2025-05-01“…The experimental results show that the proposed method can complete the corn point cloud more effectively, using a small model to help estimate the pose and dimensions of corn accurately. This work supports the precise phenotypic analysis of corn and similar crops, such as citrus and tomatoes, and promotes the development of smart agricultural technology.…”
Get full text
Article -
449
Congestion Management Using an Optimized Deep Convolution Neural Network in Deregulated Environment
Published 2023-08-01“…This failure is primarily caused due to an increase in loads or loss of transmission lines or generators in modern restructured power networks. This work introduces a CM approach using Deep Convolution Neural Network (DCNN) for minimizing congestion and supporting Independent System Operators (ISOs). …”
Get full text
Article -
450
Semantic analysis of social media messages of patients with neovascular age-related macular degeneration and diabetic macular edema by open Internet sources — a study of patients'...
Published 2023-03-01“…Quality of life (QoL) was shown to be significantly affected with inability to work as a major burden for 30 % of nAMD patients, and diabetes-associated comorbidities as a key factor compromising QoL in 20 % of DR patients. …”
Get full text
Article -
451
Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence
Published 2025-06-01“…This approach surpasses traditional readability indices, offering substantial benefits for content creation and knowledge management in fields like education, business, technical support, and policy platforms. Strategic Insights into Blockchain Adoption in Automotive Supply Chains: A Comparative AHP-TOPSIS and TISM-MICMAC Analysis The authors explore blockchain adoption in the automotive industry using a multidisciplinary approach involving AHP, TOPSIS, TISM, and MICMAC analyses. …”
Get full text
Article -
452
Organising general practice for care homes: a multi-method study
Published 2025-04-01“…NHS England funded the Vanguard initiative (2015–8) to identify and support innovative ways of working with care homes in five areas. …”
Get full text
Article -
453
IM- LTS: An Integrated Model for Lung Tumor Segmentation using Neural Networks and IoMT
Published 2025-06-01Get full text
Article -
454
Simulating and Verifying a 2D/3D Laser Line Sensor Measurement Algorithm on CAD Models and Real Objects
Published 2024-11-01“…This work not only reduces the need for physical prototyping, thereby contributing to sustainability, but also supports AI training by generating accurate synthetic data. …”
Get full text
Article -
455
Prediction of porosity, hardness and surface roughness in additive manufactured AlSi10Mg samples.
Published 2025-01-01“…For this purpose, data including porosity, surface hardness, and roughness were extracted from the literature, and additional measurements were performed on additive manufactured samples in the current work. This work compares five supervised machine learning algorithms, including artificial neural networks, support vector regression, kernel ridge regression, random forest, and Lasso regression. …”
Get full text
Article -
456
Calculation of a heat exchanger using heat pipes in the exhaust air heat recovery system
Published 2024-01-01“…The research is based on methods of thermodynamic analysis, full-scale and computational modeling of processes and objects of refrigeration and cryogenic technology, air conditioning and life support systems. …”
Get full text
Article -
457
LCAT: A Lightweight Color-Aware Transformer With Hierarchical Attention for Leaf Disease Classification in Precision Agriculture
Published 2025-01-01“…Future work includes extending LCAT to support more crop species and plant diseases and integrating it into comprehensive decision support systems for precision agriculture.…”
Get full text
Article -
458
A novel and optimized design of D-latch and D flip-flop for QCA-based digital systems
Published 2025-08-01Get full text
Article -
459
Overview of research on trusted attestation technology of cloud virtualization platform
Published 2021-12-01“…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
Get full text
Article -
460
RUL prediction method based on cross-view hybrid network model
Published 2025-01-01Get full text
Article