Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
4741
Clinical Outcome of Inter-Proximal Papilla between a Tooth and a Single Implant Treated with CAD/CAM Abutments: a Cross-Sectional Study
Published 2012-09-01“…Objectives: The aim of this study was to assess the clinical outcomes achieved with Computer-Assisted Design/Computer-Assisted Manufacturing implant abutments in the anterior maxilla.Material and Methods: Nineteen patients with a mean age of 41 (range form 26 to 63) years, treated with 21 single tooth implants and 21 Computer-Assisted Design/Computer-Assisted Manufacturing (CAD/CAM) abutments in the anterior maxillary region were included in this study. …”
Get full text
Article -
4742
Ischemic Stroke Lesion Segmentation on Multiparametric CT Perfusion Maps Using Deep Neural Network
Published 2025-01-01Get full text
Article -
4743
Femorodistal bypasses using venous “cuffs”
Published 2023-01-01“…The aim of this study was to evaluate the results of femorodistal bypass procedures with a venous cuff in critical lower extremity ischemia. …”
Get full text
Article -
4744
Influence of aging process and restoration thickness on the fracture resistance of provisional crowns: A comparative study
Published 2023-12-01“…Thus, this in-vitro study aimed to evaluate the influence of restoration thickness and aging on the fracture behavior of provisional crowns fabricated using different techniques. …”
Get full text
Article -
4745
Implementation of a Digital Model of Thermal Characteristics Based on the Temperature Field
Published 2024-06-01“…Introduction. Computer modeling allows engineers to make valid design decisions by accurately assessing the thermal characteristics of design objects. …”
Get full text
Article -
4746
Retrospective Analysis of Tooth Preparation Done by Postgraduate Trainees for Monolithic Zirconia Restorations
Published 2025-08-01“…Introduction: Computer-Aided Designing/Computer-Aided Manufacturing (CAD/CAM) technology has revolutionised the practice of restorative dentistry. …”
Get full text
Article -
4747
-
4748
Identification of novel variants in carbamoyl phosphate synthetase 1 gene and comparative pathogenicity assessments of CPS1 missense variants following ACMG/AMP-ClinGen recommendat...
Published 2025-06-01“…As recommendation for PP3/BP4, the computational tools for missense variant have been published, we performed a comparative evaluation for pathogenicity interpretation in our patients and in ClinVar database regarding CPS1 missense variants under the updated guidelines of ACMG/AMP-ClinGen. …”
Get full text
Article -
4749
-
4750
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
4751
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
4752
ADDAEIL: Anomaly Detection with Drift-Aware Ensemble-Based Incremental Learning
Published 2025-06-01Get full text
Article -
4753
-
4754
-
4755
-
4756
-
4757
GPT Models Can Perform Thematic Analysis in Public Health Studies, Akin to Qualitative Researchers
Published 2024-12-01Get full text
Article -
4758
A Three-Dimensional Scale for the Qualitative and Quantitative Assessments of Secondary Alveolar Bone Grafting (SABG) in Unilateral Cleft Lip and Palate Patients Using Cone-Beam Co...
Published 2023-04-01“…Background The objective of our study was to derive an objective assessment scale for three-dimensional (3D) qualitative and quantitative evaluation of secondary alveolar bone grafting (SABG) using cone-bone computed tomography (CBCT) in patients with unilateral cleft lip and palate (UCLP). …”
Get full text
Article -
4759
Knowledge graph completion based on iteratively learning embeddings and noise-aware rules
Published 2025-07-01“…Embedding-based KGC methods efficiently predict new facts by computing similarities among embeddings, whereas rule-based KGC methods achieve accuracy by applying logical rules. …”
Get full text
Article -
4760
Virtual Monoenergetic Imaging of Thoracoabdominal Computed Tomography Angiography on Photon-Counting Detector Computertomography: Assessment of Image Quality and Leveraging Low-keV...
Published 2024-12-01“…Background: The aim of this study was to assess the possibility of image improvement of ECG-gated, high-pitch computed tomography angiography (CTA) of the thoracoabdominal aorta before transaortic valve replacement (TAVR) on a novel dual-source photon-counting detector CT (PCD-CT) in the setting of suboptimal low-contrast attenuation. …”
Get full text
Article