Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Archaeological expeditions 1
- Archeology 1
- Climate 1
- Collection and preservation 1
- Dinosaurs 1
- English 1
- FICTION 1
- Forests and forestry 1
- Fossils 1
- Historical 1
- History 1
- Interpretation and construction 1
- Language 1
- Law 1
- Legislative power 1
- Medicine 1
- POLITICAL SCIENCE / Government / Legislative Branch 1
- Paleontologists 1
- Plant-water relationships 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
- Thrillers 1
- Trees 1
- Water in agriculture 1
-
2481
Inter-pregnancy interval and uterine rupture during a trial of labour after one previous caesarean delivery and no previous vaginal births: a retrospective population-based cohort...
Published 2025-02-01“…Methods: In this population-based cohort study, we used data from U.S National Vital Statistics System from 2011 to 2021. …”
Get full text
Article -
2482
600 meters to VO2max: Predicting Cardiorespiratory Fitness with an Uphill Run
Published 2025-01-01“…Journal of Sports Medicine, 2016(1), 3968393. Tang, M. S. S., Moore, K., McGavigan, A., Clark, R. …”
Get full text
Article -
2483
Steganographer identification of JPEG image based on feature selection and graph convolutional representation
Published 2023-07-01“…Aiming at the problem that the feature dimension of JPEG image steganalysis is too high, which leads to the complexity of distance calculation between users and a decrease in the identification performance of the steganographer, a method for steganographer recognition based on feature selection and graph convolutional representation was proposed.Firstly, the steganalysis features of the user’s images were extracted, and the feature subset with highseparability was selected.Then, the users were represented as a graph, and the features of users were obtained by training the graph convolutional neural network.Finally, because inter-class separability and intra-class aggregation were considered, the features of users that could capture the differences between users were learned.For steganographers who use JPEG steganography, such as nsF5, UED, J-UNIWARD, and so on, to embed secret information in images, the proposed method can reduce the feature dimensions and computing.The identification accuracy of various payloads can reach more than 80.4%, and it has an obvious advantage at the low payload.…”
Get full text
Article -
2484
-
2485
-
2486
Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials
Published 2023-03-01“…Counterargument: Is Something Better Than Nothing? Some may argue that for medically exigent individuals in need of a transplant, any option to participate in research is better than no option. …”
Get full text
Article -
2487
-
2488
Conscientious Objection Based on Patient Identity
Published 2022-11-01“…Aristotle writes that life’s virtues are courage, temperance, generosity, magnificence, magnanimity, mildness, amiability, truthfulness, wit, and shame.[7] Individuals possessing these traits are virtuous, but virtuous physicians must also demonstrate traits integral to their professional duties. …”
Get full text
Article -
2489
-
2490
Research of efficiency of ferrous metallurgy slag use in pavement base layers
Published 2024-12-01“…A method for assessing the stability of organomineral mixtures to the accumulation of residual deformations on a dynamic test device is proposed and the dependence of the change in the indicator over time is established. …”
Get full text
Article -
2491
Credit Risk Management Practices and Loan Performance of Commercial Banks in Uganda. A Case Study of Commercial Banks in Mbarara City
Published 2023“…Commercial banks should reexamine their clients’ profile from time to time, and ensuring that changes in clients’ credit quality change from time to time will always standout of others in terms of performance Commercial banks should ensure that effectiveness of credit risk controls are done well by looking out for collateral securities from clients before extending loans. …”
Get full text
Thesis -
2492
APG mergence and topological potential optimization based heuristic user association strategy
Published 2022-06-01“…Therefore, it is reasonable to model the problem of improving network scalable degree as minimizing network coupling degree,and it is feasible to improve network scalable degree by reducing network coupling degree.2)The upper limit of computational complexity of the proposed algorithm is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">O</mi><mo stretchy="false">(</mo><mi>K</mi><mi>N</mi><msub> <mi>log</mi> <mn>2</mn> </msub> <mi>N</mi><mo>+</mo><msup> <mi>k</mi> <mn>2</mn> </msup> <mo>+</mo><mi>N</mi><mi>N</mi><msub> <mover accent="true"> <mi>N</mi> <mo>¯</mo> </mover> <mtext>p</mtext> </msub> <mo stretchy="false">)</mo></math></inline-formula>,while that of directly solving the optimization problem is<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"><mi mathvariant="script">O</mi><mo stretchy="false">(</mo><msup> <mi>N</mi> <mrow> <msub> <mover accent="true"> <mi>N</mi> <mo>¯</mo> </mover> <mtext>u</mtext> </msub> <mi>K</mi></mrow> </msup> <mo stretchy="false">)</mo></math></inline-formula>.3)For theoretical analysis of the network scalable degree,take Fig.3 as an example.If AP2 changes,12 APs in Fig. 3(a)are affected and the network scalable degree is η<sub>2</sub>=0.51,while 4 APs in Fig.3(c)are affected and the network scalable degree is η<sub>2</sub>=0.79.4)Fig.5 shows the simulation results of network scalable degree.Compared with the traditional strategy,the network scalable degree is improved by 9.59% with 4.43% user rate loss.Compared with the strategy in[10],the network scalable degree is improved by 22.15% with 4.99% user rate loss. 5) The algorithm parameters, the threshold β<sub>0</sub>of overlap rate and the upper limit number N<sub>0</sub>of AP associated, effect the performance.As shown in Fig.6,with β<sub>0</sub>or N<sub>0</sub>decreases,η increases and the total user rate decreases. …”
Get full text
Article -
2493
-
2494
Optimizing Scanning in Youth Female Football: The Role of Verbal Instructions
Published 2025-01-01“… Introduction In dynamic sports like football, where game situations change rapidly, gathering information through visual exploration is essential for expert performance (Aksum et al., 2021; Pokolm et al., 2022). …”
Get full text
Article -
2495
The NANOGrav 15 Yr Data Set: Removing Pulsars One by One from the Pulsar Timing Array
Published 2025-01-01Get full text
Article -
2496
Protecting the Autonomy of Patients with Severe Mental Illness Through Psychiatric Advance Directive Peer-Facilitation
Published 2023-08-01“…Conrad et al., "Duties toward Patients with Psychiatric Illness," Hastings Center Report 50, no. 3 (2020): 67-69, https://doi.org/10.1002/hast.1139…”
Get full text
Article -
2497
Googling Patients
Published 2022-11-01“…Apart from the rigid context of existing statutes and laws, discussions surrounding the ethics of data, privacy, and security are occurring, and privacy laws are undergoing a period of rapid change. While patients and health entities can be reasonably sure what protections apply to medical records created by providers, there is significant uncertainty about the increasing amounts of health-related information generated and shared in our digital world by various entities. …”
Get full text
Article