Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
56121
Effects of a periodic intermittent theta burst stimulation in Alzheimer’s disease
Published 2024-02-01“…The longitudinal pipeline of the Computational Anatomy Toolbox for SPM was used to detect significant treatment-related changes over time.Results The iTBS group maintained MoCA scores relative to the control group (t=3.26, p=0.013) and reduced hippocampal atrophy, which was significantly correlated with global degeneration scale changes. …”
Get full text
Article -
56122
Ocular Biometry OCR: a machine learning algorithm leveraging optical character recognition to extract intra ocular lens biometry measurements
Published 2025-01-01“…For each patient eye, our text extraction pipeline, referred to as Ocular Biometry OCR, involves 1) cropping the report to the biometric data, 2) extracting the text via the optical character recognition model, 3) post-processing the metrics and values into key value pairs, 4) correcting erroneous angles within the pairs, 5) computing the number of errors or missing values, and 6) selecting the window specific results with fewest errors or missing values. …”
Get full text
Article -
56123
Prevalence of Preoperative Anxiety and Associated Factors Among Surgical Patients: Systematic Review and Meta-Analysis in Ethiopia
Published 2025-02-01“…STATA version 17 was used for analysis, and the odds ratios of the outcome variable were determined using the random-effects model. Computing values assessed heterogeneity among the studies for I 2 and P -values. …”
Get full text
Article -
56124
Design and validation of a-SiC/SiN hybrid photonic platform for integrated quantum photonics
Published 2024-01-01“…Recent efforts in quantum photonics emphasize on-chip generation, manipulation, and detection of single photons for quantum computing and quantum communication. In quantum photonic chips, single photons are often generated using parametric down-conversion and quantum dots. …”
Get full text
Article -
56125
Investigation of the Performance of a Sb2S3-Based Solar Cell with a Hybrid Electron Transport Layer (h-ETL): A Simulation Approach Using SCAPS-1D Software
Published 2024-01-01“…In this research contribution, computational analysis using SCAPS-1D software is performed to explore the output photovoltaic parameters of a Sb2S3-based solar cell with h-ETL. …”
Get full text
Article -
56126
-
56127
Effectiveness of Mobile Health–Based Gamification Interventions for Improving Physical Activity in Individuals With Cardiovascular Diseases: Systematic Review and Meta-Analysis of...
Published 2025-01-01“…Statistical analyses were conducted using R (version 4.3.2; R Foundation for Statistical Computing). ResultsIn total, 6 randomized controlled trials were included. …”
Get full text
Article -
56128
-
56129
Comparing Deep Learning models for mapping rice cultivation area in Bhutan using high-resolution satellite imagery
Published 2025-01-01“…Two Deep Learning approaches, point-based (DNN) and patch-based (U-Net), models were used in conjunction with cloud-computing platforms. Four different models per Deep Learning approaches (DNN and U-Net) were trained: (1) Red, Green, Blue, and Near-Infrared (RGBN) channels from Planet, (2) RGBN and Elevation data (RGBNE), (3) RGBN and Sentinel-1 data (RGBNS), and (4) RGBN with Elevation and Sentinel-1 data (RGBNES). …”
Get full text
Article -
56130
-
56131
Differentiations in Illness Duration, Thyroid-Stimulating Hormone, Glucose and P300 Latency Between Drug-Naïve Unipolar and Bipolar Depression: A Comparative Cross-Sectional S...
Published 2025-01-01“…Chao Li,1,2 Lei Yang,1,2 Qiuyu Zhang,1,2 Ying Zhang,1,2 Ranli Li,1,2 Feng Jia,1,2 Lina Wang,1,2 Xiaoyan Ma,1,2 Kaifang Yao,1,2 Hongjun Tian,3,* Zengxun Liu,4,* Chuanjun Zhuo1,2,* 1Computational Biology and Animal Imaging Center (CBAC), Tianjin Anding Hospital, Nankai University Affiliated Tianjin Anding Hospital, Tianjin Medical University Affiliated Tianjin Anding Hospital, Tianjin Medical University Affiliated Tianjin Mental Health Center, Tianjin, 300222, People’s Republic of China; 2Laboratory of Psychiatric-Neuroimaging-Genetic and Co-morbidity (PNGC_Lab), Tianjin Anding Hospital, Tianjin Mental Health Center of Tianjin Medical University, Tianjin, 300222, People’s Republic of China; 3Department of Psychiatry, Tianjin Fourth Center Hospital, Nankai University Affiliated Tianjin Fourth Center Hospital, Tianjin, 300140, People’s Republic of China; 4Department of Psychiatry, Shandong Mental Health Center, Jinan, 250014, People’s Republic of China*These authors contributed equally to this workCorrespondence: Chuanjun Zhuo, Tianjin Anding Hospital, Nankai University Affiliated Tianjin Anding Hospital, Tianjin Medical University Affiliated Tianjin Anding Hospital, Tianjin Medical University Affiliated Tianjin Mental Health Center, Tianjin, 300222, People’s Republic of China, Tel/Fax +86-22-24394542, Email chuanjunzhuotjmh@163.comBackground: Distinguishing bipolar depression (BD) from unipolar depression (UD) remains a major clinical challenge, especially in drug-naïve patients. …”
Get full text
Article -
56132
-
56133
AEOS: Transport of Metals from Minihalos following Population III Stellar Feedback
Published 2025-01-01Get full text
Article -
56134
Intelligent prediction method of virtual network function resource capacity for polymorphic network service slicing
Published 2022-06-01“…Conclusions: With the vigorous development of artificial intelligence technology, polymorphic network has given computing, storage and transmission capabilities to virtual nodes on network slices,and has been able to realize the dual improvement of network resource utilization and user experience through the adaptive flow of business demand data on the basis of autonomously sensing data throughput and autonomously predicting the resource requirements of VNFs on nodes. …”
Get full text
Article -
56135
Nitric oxide modulates contrast suppression in a subset of mouse retinal ganglion cells
Published 2025-01-01Get full text
Article -
56136
Modeling Lake Titicaca's water balance: the dominant roles of precipitation and evaporation
Published 2025-02-01“…The proposed modeling framework could be replicated in other poorly gauged large lakes because it is relatively easy to implement, requires few data, and is computationally inexpensive.</p>…”
Get full text
Article -
56137
Neurological history both twinned and queried by generative artificial intelligence
Published 2025-01-01Get full text
Article -
56138
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Secondly, the proposed scheme is compared with some access control schemes with similar technologies in recent years in terms of group order,access structure,policy hiding and so on,it can be seen from the comparison results that the scheme in this paper has certain advantages in terms of functional characteristics.Afterwards,the cost of deploying contracts and executing related functions on the blockchain is evaluated.The results show that the gas cost of the scheme in this paper is within a reasonable range.The final simulation results show that the proposed scheme has high efficiency in both the access control stage and the data sharing stage.According to the design of the existing paper comparative experiments,we set the number of attributes to 0-20.In the access control stage, the initialization time, key generation time, encryption time and decryption time are compared with other schemes.The results show that although the computational overhead of the proposed scheme is relatively large in the initialization stage, the efficiency in the key generation stage, encryption stage and decryption stage is higher than that of the other three schemes, so the proposed scheme has higher efficiency in the access control stage.In the data sharing stage, the re-encryption time and re-decryption time are compared with other schemes, respectively. …”
Get full text
Article -
56139
-
56140
Linking Research Data with Physically Preserved Research Materials in Chemistry
Published 2025-01-01Get full text
Article