Suggested Topics within your search.
Suggested Topics within your search.
-
781
Clinical Utility of Integrated Multidisciplinary Patient-Centered Information in Breast Cancer Care: A Mixed Methods Study
Published 2025-04-01“…Atsuko Sugiyama,1– 3 Kazuki Utsunomiya,1 Katsuhiko Fujimoto,1 Hiroko Bando4 1R&D Planning Office, Canon Medical Systems Corporation, Otawara, Tochigi, Japan; 2Research and Development Center, Canon Medical Systems Corporation, Otawara, Tochigi, Japan; 3Graduate School of Biomedical Engineering, Tohoku University, Sendai, Miyagi, Japan; 4Department of Breast-Thyroid-Endocrine Surgery, Institute of Medicine, University of Tsukuba, Tsukuba, Ibaraki, JapanCorrespondence: Atsuko Sugiyama, R&D Planning Office, Canon Medical Systems Corporation, 1385, Shimoishigami, Otawara-shi, Tochigi-ken, 324-8550, Japan, Tel +81 287 26 6255, Fax +81 287 26 6066, Email atsuko.sugiyama@medical.canonPurpose: The purpose of this study was to evaluate and assess the clinical utility of the integrated multidisciplinary patient-centered information (PCI) written by various healthcare professionals for promoting patient-centered care in the treatment and care of breast cancer patients.Methods: This study employed a convergent mixed methods interventional design in which Control and Intervention were compared by integrating both quantitative and qualitative results obtained from questionnaires and verbatim transcripts. …”
Get full text
Article -
782
Healthcare workers’ perception of gender and work roles during the COVID-19 pandemic: a mixed-methods study
Published 2021-12-01“…We sought to determine how work and mental health for healthcare workers changed during the COVID-19 pandemic in a universal healthcare system, stratified by gender factors.Design A mixed-methods study was employed. Phase 1 was an anonymous, internet-based survey (7 May–15 July 2020). …”
Get full text
Article -
783
Influence and Mechanism of Solid-Phase Particle Factors on Oil–Solid Separation of Oily Sludge Treated by Flotation Method
Published 2024-12-01“…The response surface methodology (RSM) method was used to determine the Rs as the main control factor of the flotation process, and the oil content of residue phase in mixed-size sand OS was optimised to 2.63%. …”
Get full text
Article -
784
Research of Gear Meshing Stiffness Identification Algorithm based on Exponential Window Interception Recursive Least Square Method
Published 2021-04-01“…To calculate speed curve of the input and output gears,the empirical mode decomposition (EMD) method is used to decompose vibration signal into intrinsic mode function (IMF) of different frequency,the IMFs are used to reconstruct character signals of input and output gears basing on the mean frequency of IMFs. …”
Get full text
Article -
785
Research on the Classification Method of Tea Tree Seeds Quality Based on Mid-Infrared Spectroscopy and Improved DenseNet
Published 2025-06-01“…Four types of tea tree seeds in different states were prepared, and their spectral data were collected and preprocessed using Savitzky–Golay (SG) filtering and wavelet transform. …”
Get full text
Article -
786
Preparing of CuCo2O4 compound by Sol-gel method and studying its structural properties
Published 2024-09-01“… The CuCo2O4 compound has been prepared by the Sol-gel method starting with cobalt sulfate CoSO4.7H2O and copper nitrate, using Pectin as a stabilizer. …”
Get full text
Article -
787
Antibacterial property of hydroxyapatite extracted from biological sources and doped with Cu2+ and Ag+ by Sol-gels method
Published 2025-04-01“…The physical properties of extracted HA and HA-Doped Cu2+-Ag+ were investigated using X-ray diffraction and Fourier transform infrared spectroscopy (FT-IR). It was observed in SEM that the distribution of diameter and size is different depending on the molar ratio of Cu2+ and Ag+. …”
Get full text
Article -
788
Asymmetric watermarking based on Contourlet transform and subspace projection
Published 2009-01-01“…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
Get full text
Article -
789
A Fault Diagnosis Method for Oil Well Electrical Power Diagrams Based on Multidimensional Clustering Performance Evaluation
Published 2025-03-01“…Through the dynamic mathematical modeling of the pumping unit system, we transform the indicator diagram of beam-pumping units into electric power diagrams and conduct an in-depth analysis of the characteristics of electric power diagrams under five typical operating conditions, revealing the impact of different working conditions on electric power. …”
Get full text
Article -
790
Damage identification of structures using experimental modal analysis and continuous wavelet transform
Published 2017-07-01“…Seven numerical examples are conducted on two double layer diamatic domes with different sizes to assess the effectiveness of the proposed 2D-CWT method. …”
Get full text
Article -
791
Performance Analysis of Transform University Studies in Indonesia Context
Published 2018-06-01“…The purpose of this study are to analyze the performance of Universitas Negeri Gorontalo (UNG) in the financial and academic aspects; to analyze the gaps in financial performance and academic performance; and to know the differences in financial performance and academic performance before and after transformation into a State Universities Public Service Agency (PTN BLU). …”
Get full text
Article -
792
-
793
Presenting a model of political behavior based on the theory of shadow management in the public sector with a hybrid method
Published 2025-03-01“…Abstract The aim of this study is to present a political behavior model based on shadow management theory in the public sector with the metasynthesis method. This study is qualitative in terms of data collection, and metasynthetic in terms of research implementation. …”
Get full text
Article -
794
A novel PV power prediction method with TCN-Wpsformer model considering data repair and FCM cluster
Published 2025-04-01Get full text
Article -
795
A single flow detection enabled method for DDoS attacks in IoT based on traffic feature reconstruction and mapping
Published 2024-01-01“…To address the slow response time of existing detection modules to Internet of things (IoT) distributed denial of service (DDoS) attacks, their low feature differentiation, and poor detection performance, a single flow detection enabled method based on traffic feature reconstruction and mapping (SFDTFRM) was proposed.Firstly, SFDTFRM employed a queue to store previously arrived flow based on the first in, first out rule.Secondly, to address the issue of similarity between normal communication traffic of IoT devices and DDoS attack traffic, a multidimensional reconstruction neural network model more lightweight compared to the baseline model and a function mapping method were proposed.The modified model loss function was utilized to reconstruct the quantitative feature matrix of the queue according to the corresponding index, and transformed into a mapping feature matrix through the function mapping method, enhancing the differences between different types of traffic, including normal communication traffic of IoT devices and DDoS attack traffic.Finally, the frequency information was extracted using a text convolutional network and information entropy calculation and the machine learning classifier was employed for DDoS attack traffic detection.The experimental results on two benchmark datasets show that SFDTFRM can effectively detect different DDoS attacks, and the average metrics value of SFDTFRM is a maximum of 12.01% higher than other existing methods.…”
Get full text
Article -
796
Modeling and Simulation Analysis of DC/DC High Frequency Isolated Converter Based on Average State Space Method
Published 2011-01-01“…Secondly, analyzed the key voltage, current ideal waves in a cycle, and drew the equivalent circuits under different states. Thirdly, in order to obtain the small-signal transfer function in continuous work mode, the average and linearization method was to deal with the state variable equations. …”
Get full text
Article -
797
A DC Bias Current Reducing Method Considering Grounding Electrode Location and Receiving-end Grid Structure
Published 2021-07-01“…Considering the structure of receiving-end grid and the location selection of grounding electrode, a DCBC value reduction method for converter and AC transformers is proposed. …”
Get full text
Article -
798
Novel Method of Fitting a Nonlinear Function to Data of Measurement Based on Linearization by Change Variables, Examples and Uncertainty
Published 2024-12-01“…In this procedure, one or two new variables are implemented to linearize this function for using the linear regression method. The best parameters of the straight-line in new variables are adjusted to the transformed coordinates of tested points according to the weighted total mean square criterion WTLS, or WTLS-C of data points are also correlated. …”
Get full text
Article -
799
Mapping Knowledge Domain to Analyze the Building Information Modeling on Building Energy Saving Based on Visualized Analysis Method
Published 2023-01-01“…In order to analyze the research status of BIM in the field of energy-saving transformation, find its research hotspots, and reveal its future development trend to guide the practice and application of building information model better, the mapping knowledge domain is constructed via the literature visualization analysis method based on the theory of cocitation analysis and the pathfinder algorithm This is to analyze the hot spots and reveal the frontier of building information modeling on building energy saving. …”
Get full text
Article -
800
Haar wavelet collocation method for existence and numerical solutions of fourth-order integro-differential equations with bounded coefficients
Published 2025-04-01“…On applying the Haar collocation method, the suggested problem of IDEs is transformed to a system of algebraic equations. …”
Get full text
Article