Suggested Topics within your search.
Suggested Topics within your search.
-
3501
ACCELERATED REGIMENS OF ADJUVANT RADIOTHERAPY IN THE TREATMENT OF BREAST CANCER
Published 2017-09-01“…Treatment of breast cancer (BC) is a complex multidisciplinary problem. Often, radiation therapy is an obligatory component of treatment of breast cancer patients. …”
Get full text
Article -
3502
Experimental Study on Seepage Properties of Jointed Rock-Like Samples Based on 3D Printing Techniques
Published 2020-01-01“…Sample making of fractured rock mass is a big problem in rock mechanical test. The specimens prepared by traditional rock core drilling have some disadvantages such as unclear internal structure and great difference in mechanical properties; while, the samples prepared by inserting and seaming method have some other disadvantages such as hard to control the attitude of precast-joints, low accuracy. …”
Get full text
Article -
3503
Entrepreneurship and territorial economic development in Algeria
Published 2024-03-01“…This study will explore these dynamics specifically in the Algerian context, examining how entrepreneurship can be a crucial catalyst for territorial economic development and how, in turn, economic development can create an environment conducive to entrepreneurial growth. The problem addressed in this article is to study the key factors that have played a significant role in the dynamics of the entrepreneurial process. …”
Get full text
Article -
3504
Automatic Registration of Remote Sensing High-Resolution Hyperspectral Images Based on Global and Local Features
Published 2025-03-01“…The advantages of the proposed algorithm in terms of registration accuracy and real-time performance make it have a broad prospect for application in satellite ground application systems.…”
Get full text
Article -
3505
Context Adaptation of Fuzzy Inference System-Based Construction Labor Productivity Models
Published 2018-01-01“…Construction labor productivity (CLP) is one of the most studied areas in the construction research field, and several context-specific predictive models have been developed. However, CLP model development remains a challenge, as the complex impact of multiple subjective and objective influencing variables have to be examined in various project contexts while dealing with limited data availability. …”
Get full text
Article -
3506
Violence against children as a special object for the statistical research
Published 2017-05-01“…Despite the numerous achievements and success in various spheres of human activity, the modern civilization, unfortunately, has not yet been able to completely get rid of such a serious and shameful problem as violence against children. Not only in economically backward and developing countries, where numerous forms of infringement of the children’s rights have deep historical roots, but in the vast majority of the most developed countries of the world, violence against children has now acquired massive and catastrophic proportions. …”
Get full text
Article -
3507
Immunoassay–mass spectrometry to identify Brucella melitensis
Published 2025-02-01“…When dealing with hazardous bacteria like Brucella, which are more difficult to handle and cure, this problem becomes even more crucial. To overcome these obstacles, Fe3O4 magnetic nanoparticles (MNPs) linked with Brucella-specific antibodies and MALDI-TOF MS analysis have been used to create a quick and accurate technique for direct bacterial separation and identification in complex samples. …”
Get full text
Article -
3508
Ecological security assessment of Yunnan Province, China in the context of Production–Living–Ecological space division
Published 2024-08-01“…The ecological security evaluation model of PLES constructed in this study solves the problem of complex and incomplete ecological security evaluation indexes in the past, and the results of the study are more refined and precise, which provides new ideas for the study of regional ecological security.…”
Get full text
Article -
3509
Botnet detection in internet of things using stacked ensemble learning model
Published 2025-07-01“…Abstract Botnets are used for malicious activities such as cyber-attacks, spamming, and data theft and have become a significant threat to cyber security. …”
Get full text
Article -
3510
USING A CASE METHOD TO BUILD ENVIRONMENTAL COMPETENCE OF STUDENTS OF ECONOMICS IN ESP LESSONS
Published 2024-11-01“…With the help of this method, students have the opportunity to show initiative and feel independent in mastering theoretical concepts and practical skills. …”
Get full text
Article -
3511
Differently different?: A commentary on the emerging social cognitive neuroscience of female autism
Published 2024-06-01“…With respect to research in the field of sex/gender cognitive neuroscience, there is emerging evidence of female differences in patterns of connectivity and/or activation in the social brain that are at odds with those reported in previous, male-only studies. Decades of research have excluded or overlooked females on the autistic spectrum, resulting in the construction of inaccurate and misleading cognitive neuroscience models, and missed opportunities to explore the brain bases of this highly complex condition. …”
Get full text
Article -
3512
The Construction and Empirical Analysis of the Company’s Financial Early Warning Model Based on Data Mining Algorithms
Published 2022-01-01“…Facing the increasingly complex and changeable social and economic environment, the difficulty of enterprise risk management has gradually increased. …”
Get full text
Article -
3513
Fractional-Order Adaptive P-Laplace Equation-Based Art Image Edge Detection
Published 2021-01-01“…Some of the remote sensing images have a complex background and low illumination compared with standard images and are easy to be mixed with noise during acquisition; some of the fabric images have rich texture information, which adds difficulty to the related processing, and are also easy to be mixed with noise during acquisition. …”
Get full text
Article -
3514
Efficient Method of Road Outlier Recognition Using Deep Learning Coupled with Data Augmentation Approach
Published 2024-06-01“… In recent years, Closed-circuit Television (CCTV) cameras have been playing a vital role in the surveillance of both public and private areas. …”
Get full text
Article -
3515
-
3516
How lived experiences of illness trajectories, burdens of treatment, and social inequalities shape service user and caregiver participation in health and social care: a theory-info...
Published 2025-06-01“…We may also need to learn new skills to look after ourselves and others. Sometimes, we have to work out how we are going to pay for care. …”
Get full text
Article -
3517
Machine Learning Models for Tracking Blood Loss and Resuscitation in a Hemorrhagic Shock Swine Injury Model
Published 2024-10-01“…Hemorrhage leading to life-threatening shock is a common and critical problem in both civilian and military medicine. Due to complex physiological compensatory mechanisms, traditional vital signs may fail to detect patients’ impending hemorrhagic shock in a timely manner when life-saving interventions are still viable. …”
Get full text
Article -
3518
Integrating Biological Covariates into Gene Expression-Based Predictors of Radiation Sensitivity
Published 2017-01-01“…However, these approaches have also created difficulties in trying to use gene expression alone to predict a complex trait. …”
Get full text
Article -
3519
Constructing ancestral recombination graphs through reinforcement learning
Published 2025-04-01“…IntroductionOver the years, many approaches have been proposed to build ancestral recombination graphs (ARGs), graphs used to represent the genetic relationship between individuals. …”
Get full text
Article -
3520
Application of Formal Methods in Power Grid Cyber Physical Systems
Published 2021-03-01“…The model checking software tool can provide a reference solution to the reliability assurance problem caused by the rapid increase of embedded devices in terms of scale and complexity.…”
Get full text
Article