Suggested Topics within your search.
Suggested Topics within your search.
- History 4
- methods 4
- Child care 2
- Child, Hospitalized 2
- Clinical guidelines 2
- Common law 2
- Damages 2
- Developing Countries 2
- English 2
- Grammar 2
- Health and hygiene 2
- Hospitals 2
- Interpretation and construction 2
- Law 2
- Mass media 2
- Methodology 2
- Pediatrics 2
- Spanish language 2
- Women 2
- Actions and defenses 1
- Administrative law 1
- Aging 1
- Agricultural laws and legislation 1
- Agricultural prices 1
- Agriculture 1
- American teachers 1
- Authorship 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
-
14081
Urban Tree Selection for Diversity
Published 2020-10-01“…Having a variety of trees can increase the aesthetic value for residents and create habitats for plants and animals. Some common street trees currently in the landscape are not site-appropriate and create infrastructure damage. …”
Get full text
Article -
14082
Negative Correlation Learning for Customer Churn Prediction: A Comparison Study
Published 2015-01-01“…Experiments results confirm that NCL based MLP ensemble can achieve better generalization performance (high churn rate) compared with ensemble of MLP without NCL (flat ensemble) and other common data mining techniques used for churn analysis.…”
Get full text
Article -
14083
Software as a Service: an effective platform to deliver holistic Hotel Performance Management Systems
Published 2018-01-01“…Software deployed in the cloud, delivered and licensed as a service, is becoming increasingly common and accepted in a business context. Although, Business Intelligence (BI) solutions are not usually distributed in the SaaS model, there are some examples that this is changing. …”
Get full text
Article -
14084
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01“…It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the common pain points in cybersecurity operations, such as high manual dependency, relatively fragmented cybersecurity capability platforms, and missing key points in cybersecurity operations. …”
Get full text
Article -
14085
Approach to Management of Thrombotic Thrombocytopenic Purpura at University of Cincinnati
Published 2013-01-01“…Thrombotic Thrombocytopenic Purpura (TTP) is a rare hematologic emergency, congenital or acquired, characterized by ischemic damage of various organs because of platelet aggregation. It is the common name for adults with microangiopathic hemolytic anemia, thrombocytopenia, with or without neurologic or renal abnormalities, and without another etiology; children without renal failure are also described as TTP. …”
Get full text
Article -
14086
Optimization of Analytical Reconstruction Algorithms for Arbitrary CBCT Trajectory Using Deep Learning
Published 2025-02-01“…Although iterative methods are a common solution, they require substantial computational time and resources. …”
Get full text
Article -
14087
USE OF NATURAL DOLOMITE AS A CHEAP FOAMING AGENT FOR PRODUCING GLASS FOAMS FROM GLASS WASTE IN THE MICROWAVE FIELD
Published 2020-03-01“…The originality of the work is the application of the microwave energy, unlike the conventional techniques commonly used in the world. The main advantage highlighted by the experiments is the very low specific energy consumption (below 1.5 kWh/kg), due to the peculiarities of the microwave heating technique. …”
Get full text
Article -
14088
Epilepsy: The Quintessential Pathology of Consciousness
Published 2011-01-01“…Despite variations in ictal origin, behaviour and electrophysiology, the individual seizure types share common neuroanatomical foundations generating impaired consciousness. …”
Get full text
Article -
14089
Light-weighted vehicle detection network based on improved YOLOv3-tiny
Published 2022-03-01“…Vehicle detection is one of the most challenging research works on environment perception for intelligent vehicle. The commonly used object detection network is too large and can only be realized in real-time on a high-performance server. …”
Get full text
Article -
14090
The multi-layered ring under parabolic distribution of radial stresses combined with uniform internal and external pressure
Published 2017-04-01“…Taking advantage of the results provided by the analytic solution, a numerical model, simulating the configuration of a threelayered ring (quite commonly encountered in practical applications) is validated. …”
Get full text
Article -
14091
Sigmoid Venous Thrombosis in JAK2 V617F Mutated Polycythemia Vera
Published 2022-01-01“…Even so, intracranial venous thrombosis is not among the most common events, and it should be kept in the differential for any patient with myeloproliferative neoplasms presenting with new neurological symptoms.…”
Get full text
Article -
14092
Safety Profile of the New 5-ASA Based Compounds
Published 1990-01-01“…An idiosyncratic reaction with worsening of symptoms can occur. Diarrhea is more common with olsalazine, and it is due to the effect of olsalazine itself on the small bowel. not the 5-ASA component. …”
Get full text
Article -
14093
Cigarette Smoking and Alcohol Use among Adolescents and Young Adults with Asthma
Published 2011-01-01“…Asthma is one of the most common, serious chronic diseases in pediatric and young adult populations. …”
Get full text
Article -
14094
Capacitance enhancement by ion-laminated borophene-like layered materials
Published 2025-01-01“…That is difficult for general materials since the dielectric constant of common materials is below several thousand.…”
Get full text
Article -
14095
Matérialiser la frontière autour de l’empereur dans l’Antiquité tardive
Published 2020-12-01“…This paper investigates the various elements materialising a frontier between the emperor and common mortals in Late Antiquity, between the 4th and the 6th century AD, especially in the framework of the imperial court ceremonial. …”
Get full text
Article -
14096
Radiochemistry for positron emission tomography
Published 2023-06-01“…In this work, we provide an overview of commonly used chemical transformations for the syntheses of PET tracers in all aspects of radiochemistry, thereby highlighting recent breakthrough discoveries and contemporary challenges in the field. …”
Get full text
Article -
14097
An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks
Published 2019-06-01“…Message authentication is a common way for ensuring information reliability, but it is an unaffordable computational cost for single vehicle. …”
Get full text
Article -
14098
Comparison between dog-bone and Gaussian specimens for size effect evaluation in gigacycle fatigue
Published 2013-09-01“…Gigacycle fatigue tests, performed with ultrasonic fatigue testing machines, are commonly carried out by using hourglass shaped specimens with a small risk volume. …”
Get full text
Article -
14099
Research progress of assessment tool and prevention of incontinence-associated dermatitis (失禁相关性皮炎评估工具和预防的研究进展)
Published 2022-03-01“…Incontinence-associated dermatitis (IAD) is a common type of irritant contact dermatitis, and accurate assessment and diagnosis are important for early prevention and treatment. …”
Get full text
Article -
14100
Oral hygiene and smoking habit as risk factors of periodontal disease.
Published 2009-04-01“…<strong>Background:</strong> Peridontal diseases are among the most common diseases affecting human beings, and these are more frequent after the age of 35. …”
Get full text
Article