-
181
Why Minimally Invasive Techniques Are the Future of Foot Surgery?
Published 2024-09-01“…Nowadays, the question is whether to use open surgery at all for the treatment of foot deformities? The aim of this article is to show the application of minimally invasive techniques for the correction of various orthopeadic diseases of the foot and ankle - benefits, negatives, scope of application and results Materials and Methods: The study included 110 patients who underwent percutaneous (minimally invasive) surgery in the period 2019-2024. …”
Get full text
Article -
182
Developing an Ontology for Business Process Management Techniques and Tools
Published 2023-01-01“…This study aims to design and develop an ontology to facilitate the selection of suitable techniques and tools at each step of the BPM life cycle. …”
Get full text
Article -
183
Comparative Study of Behavior Management Techniques in Pediatric Dentistry
Published 2025-06-01“…This study aims to compare the effectiveness of these behavior management techniques in achieving successful treatment outcomes. …”
Get full text
Article -
184
A retrospective comparative study of the enhanced view-totally extraperitoneal technique versus the traditional totally extraperitoneal technique in managing recurrent inguinal her...
Published 2025-08-01“…It is unclear which laparoscopic approach should be used. The aim of the study was to evaluate the safety and efficacy of the laparoscopic enhanced view-total extraperitoneal (eTEP) technique and total extraperitoneal (TEP) technique in the treatment of recurrent inguinal hernias. …”
Get full text
Article -
185
Data augmentation of time-series data in human movement biomechanics: A scoping review.
Published 2025-01-01“…There is no universal best practice for augmenting biomechanical time-series data; instead, methods vary based on study aims. …”
Get full text
Article -
186
Annotated data for semantic role labeling of crisis events in Indonesian TweetsMendeley Data
Published 2025-08-01“…This dataset includes entity labels for Named Entity Recognition (NER), another information extraction technique besides SRL. Text data was obtained through a crawling process on Twitter using specific keywords from 2018–2023, then preprocessed to obtain clean and relevant data for crisis events in Indonesia. …”
Get full text
Article -
187
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Published 2023-09-01Get full text
Article -
188
Federated Learning for IoT: A Survey of Techniques, Challenges, and Applications
Published 2025-01-01“…Federated Learning (FL) has emerged as a pivotal approach for decentralized Machine Learning (ML), addressing the unique demands of the Internet of Things (IoT) environments where data privacy, bandwidth constraints, and device heterogeneity are paramount. …”
Get full text
Article -
189
ANALISIS TEKNIK PENERJEMAHAN ADAPTASI DAN VARIASI PADA SUBTITLE FILM BATMAN VERSI BAHASA JAWA MATARAMAN
Published 2018-04-01“…The aim of this study is to identify and describe the cultural elements translated using adaptation technique and linguistic elements translated using variation technique in Batman movie subtitled into Mataraman Javanese. …”
Get full text
Article -
190
Subliminal Cues While Teaching: HCI Technique for Enhanced Learning
Published 2011-01-01“…This paper presents results from an empirical study conducted with a subliminal teaching technique aimed at enhancing learner's performance in Intelligent Systems through the use of physiological sensors. …”
Get full text
Article -
191
Study of Lactic Acid Thermal Behavior Using Thermoanalytical Techniques
Published 2017-01-01Get full text
Article -
192
Survey data on fishermen perception of marine protected areas in West Coast of MalaysiaMendeley Data
Published 2025-06-01“…This article presents data regarding fishermen's perceptions of MPAs, including demographic and fishermen profile. …”
Get full text
Article -
193
Kombinasi Gifshuffle, Enkripsi AES dan Kompresi Data Huffman untuk Meningkatkan Keamanan Data
Published 2018-10-01“…A variety of ways are done to protect data or information. Data security techniques have grown very rapidly. …”
Get full text
Article -
194
Structuring a textile knitting dataset for machine learning and data mining applicationsMendeley Data
Published 2025-08-01“…These techniques included data cleaning, normalization, and feature engineering, all of which were crucial in ensuring the quality and usability of the dataset. …”
Get full text
Article -
195
Archaeological documentation and data sharing: digital surveying and open data approach applied to archaeological fieldworks
Published 2019-01-01“…. • The main aim of this paper is to present a workflow for archaeological data sharing as open data with a large level of interoperability…”
Get full text
Article -
196
Automated data processing and feature engineering for deep learning and big data applications: A survey
Published 2025-03-01“…Modern approach to artificial intelligence (AI) aims to design algorithms that learn directly from data. …”
Get full text
Article -
197
Scalable Clustering of Complex ECG Health Data: Big Data Clustering Analysis with UMAP and HDBSCAN
Published 2025-06-01“…Each dataset includes 153 ECG and heart rate variability (HRV) features, including both conventional and novel diagnostic parameters obtained using a Universal Scoring System. The study aims to apply unsupervised clustering algorithms to ECG data to detect latent risk profiles related to heart failure, based on distinctive ECG features. …”
Get full text
Article -
198
A survey of sand-dust image visual enhancement techniques
Published 2025-01-01Get full text
Article -
199
A survey of sand-dust image visual enhancement techniques
Published 2025-01-01Get full text
Article -
200
Detection of Fake Instagram Accounts via Machine Learning Techniques
Published 2024-11-01Get full text
Article