Suggested Topics within your search.
Suggested Topics within your search.
- History 4
- Economic conditions 2
- Politics and government 2
- Telemedicine 2
- Civil rights 1
- Civilization 1
- Communication in rehabilitation 1
- Constitutional history 1
- Constitutional law 1
- Decolonization 1
- Delivery of Health Care 1
- Democracy 1
- Economic development 1
- Economic forecasting 1
- Economic stabilization 1
- Electronic Health Records 1
- Encyclopedias 1
- European Union 1
- Foreign relations 1
- Human rights 1
- Leadership 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical rehabilitation 1
- Medical technology 1
- Medical telematics 1
- Nursing 1
- Rehabilitation 1
- Representative government and representation 1
- Ritual 1
-
2241
Iron Loading and Overloading due to Ineffective Erythropoiesis
Published 2010-01-01“…In many anemias, additional sources of iron from diet and tissue stores are needed to meet the erythroid demand. Among a subset of anemias that arise from ineffective erythropoiesis, iron absorption and accumulation in the tissues increases to levels that are in excess of erythropoiesis demand even in the absence of transfusion. …”
Get full text
Article -
2242
Steganographer identification of JPEG image based on feature selection and graph convolutional representation
Published 2023-07-01“…Aiming at the problem that the feature dimension of JPEG image steganalysis is too high, which leads to the complexity of distance calculation between users and a decrease in the identification performance of the steganographer, a method for steganographer recognition based on feature selection and graph convolutional representation was proposed.Firstly, the steganalysis features of the user’s images were extracted, and the feature subset with highseparability was selected.Then, the users were represented as a graph, and the features of users were obtained by training the graph convolutional neural network.Finally, because inter-class separability and intra-class aggregation were considered, the features of users that could capture the differences between users were learned.For steganographers who use JPEG steganography, such as nsF5, UED, J-UNIWARD, and so on, to embed secret information in images, the proposed method can reduce the feature dimensions and computing.The identification accuracy of various payloads can reach more than 80.4%, and it has an obvious advantage at the low payload.…”
Get full text
Article -
2243
DİJİTAL ÇAĞDA YENİ BİR GİRİŞİMCİLİK YAKLAŞIMI: DİJİTAL GİRİŞİMCİLİK
Published 2018-11-01“…Ayrıca, diğer çalışmalardan farklıolarak Dünya’dan ve Türkiye’den güncel dijital girişim örnekleri sunulmuştur. 1990’lıyılların sonlarına doğru özellikle Amerikan kökenli şirketlerde ortaya çıkandijital girişimciliğin Türkiye’de 2000 yılından sonra çeşitli sektörlerde yaygınlaşmayabaşladığı sonucuna varılmıştır.…”
Get full text
Article -
2244
On maximum residual block Kaczmarz method for solving large consistent linear systems
Published 2024-11-01“…This method completes the iterative process by projecting the current solution vector onto each row of the constrained subset of the matrix $ A $ and averaging it with different extrapolation steps. …”
Get full text
Article -
2245
Pain Management in Functional Gastrointestinal Disorders
Published 1995-01-01“…A multidisciplinary team approach is ideal for the smaller subset of patients with severe and disabling symptoms. …”
Get full text
Article -
2246
Network inference with hidden units
Published 2013-08-01“…We derive learning rules for finding the connections between units in stochastic dynamical networks from the recorded history of a ``visible'' subset of the units. We consider two models. In both of them, the visible units are binary and stochastic. …”
Get full text
Article -
2247
Strong Convergence of Viscosity Approximation Methods for Nonexpansive Mappings in CAT(0) Spaces
Published 2012-01-01“…Consider a nonexpansive self-mapping T of a closed convex subset C of a CAT(0) space X. Suppose that the set Fix(T) of fixed points of T is nonempty. …”
Get full text
Article -
2248
A Novel Adaptive Probabilistic Nonlinear Denoising Approach for Enhancing PET Data Sinogram
Published 2013-01-01“…The PET images are reconstructed using the Ordered Subset Expectation Maximization (OSEM). We demonstrate through simulations with images contaminated by Poisson noise that the performance of the proposed method substantially surpasses that of recently published methods, both visually and in terms of statistical measures.…”
Get full text
Article -
2249
Cancer Classification Using Pattern Recognition and Computer Vision Techniques
Published 2024-01-01“…A comparative analysis of classifiers, including K-Nearest Neighbors (KNN), Support Vector Machines (SVM), and Linear Discriminant Analysis (LDA), demonstrated that the HFWGS method consistently improved classification performance, achieving 100% accuracy with a reduced subset of genes. The proposed methods provide an efficient framework for optimizing gene selection and improving diagnostic accuracy in leukemia, paving the way for more targeted therapeutic interventions.…”
Get full text
Article -
2250
Regulation of T Helper 17 by Bacteria: An Approach for the Treatment of Hepatocellular Carcinoma
Published 2012-01-01“…T helper 17 () is a novel subset of T helper cells that has recently been identified in the hepatocellular carcinoma (HCC) tumor environment. …”
Get full text
Article -
2251
Extranodal Rosai–Dorfman Disease Presenting as a Mediastinal Mass with Pulmonary Artery Invasion
Published 2018-01-01“…Rosai–Dorfman disease (RDD) is a rare, nonmalignant disorder of histiocyte proliferation typically involving the cervical lymph nodes. However, a subset of patients with RDD will display extranodal manifestations that are highly variable in presentation, more challenging to diagnose, and less likely to spontaneously regress compared to nodal disease. …”
Get full text
Article -
2252
Novel MCDM Methods and Similarity Measures for Extended Fuzzy Parameterized Possibility Fuzzy Soft Information with Their Applications
Published 2023-01-01“…The respective operations and properties such as subset, complement, union, and intersection are presented along with their numerical illustrations. …”
Get full text
Article -
2253
FİRDEVSÎ-İ RUMÎ, HAYATI VE ESERLERİ HAKKINDA YENİ BİLGİLER
Published 2016-01-01“…Bu çalışmada Firdevsî’ye ait olduğu belirtilen eserlerin detaylı bir incelemesi yapılmış olup konuyla ilgili son ve güncel bilgiler aktarılmıştır. Çalışmada bazı eserlerin arşiv veya kütüphane numaraları güncellenmiş, içerikleri hakkında yeni bilgiler aktarılmıştır. …”
Get full text
Article -
2254
Multi-label feature selection based on dynamic graph Laplacian
Published 2020-12-01“…In view of the problems that graph-based multi-label feature selection methods ignore the dynamic change of graph Laplacian matrix, as well as such methods employ logical-value labels to guide feature selection process and loses label information, a multi-label feature selection method based on both dynamic graph Laplacian matrix and real-value labels was proposed.The robust low-dimensional space of feature matrix was used to construct a dynamic graph Laplacian matrix, and the robust low-dimensional space was used as the real-value label space.Furthermore, manifold and non-negative constraints were adopted to transform logical labels into real-valued labels to address the issues mentioned above.The proposed method was compared to three multi-label feature selection methods on nine multi-label benchmark data sets in experiments.The experimental results demonstrate that the proposed multi-label feature selection method can obtain the higher quality feature subset and achieve good classification performance.…”
Get full text
Article -
2255
Boolean Algebra of Soft Q-Sets in Soft Topological Spaces
Published 2022-01-01“…We show that the soft complement, soft closure, and soft interior of a soft Q-set are all soft Q-sets. We show that a soft subset K of a given soft topological space is a soft Q-set if and only if K is a soft symmetric difference between a soft clopen set and a soft nowhere dense set. …”
Get full text
Article -
2256
Supplemental online resources improve data literacy education: Evidence from a social science methods course.
Published 2024-01-01“…Each student is randomly assigned to a subset of the online supplemental instruction modules and takes an exam assessing concepts covered by the course material and supplemented by the modules. …”
Get full text
Article -
2257
Stochastic epidemic models with a backward bifurcation
Published 2006-04-01“…Thusa region of bistability exists in a subset of parameter space.The dynamics of the stochastic epidemic models are investigated in this regionof bistability, and compared with those of the deterministic model. …”
Get full text
Article -
2258
Mushrooms, Microdosing, and Mental Illness: The Effect of Psilocybin on Neurotransmitters, Neuroinflammation, and Neuroplasticity
Published 2025-01-01“…While there are multiple factors contributing to this problem, neuroinflammation underlies a significant subset of psychiatric conditions, particularly major depressive and anxiety disorders. …”
Get full text
Article -
2259
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01“…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
Get full text
Article -
2260
Role of Adaptive Immunity in Alcoholic Liver Disease
Published 2012-01-01“…In particular, autoantibodies against cytochrome P4502E1 (CYP2E1) are evident in a subset of ALD patients. Altogether these results suggest that allo- and autoimmune reactions triggered by oxidative stress might contribute to hepatic inflammation during the progression of ALD.…”
Get full text
Article