Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
741
Ovarian cancer unmasked by technetium-99m bone scintigraphy and single-photon emission computed tomography-computed tomography
Published 2019-01-01“…We report a case of a 30-year-old female patient with a painless palpable nodule in the chest wall, evaluated for osseous involvement by technetium-99m (Tc-99m) bone scintigraphy. …”
Get full text
Article -
742
Uncertainty-Aware Appraising of User Interfaces in Human Computer Interactions: Blending Tree Soft Sets and Neutrosophic Computational Methodological
Published 2025-05-01“…Human Computer Interactions (HCI) is a multifaceted discipline that focuses on designing, appraising, and implementing interactive computer systems to improve accessibility, usability, and user experience. …”
Get full text
Article -
743
Evaluating the FLUX.1 Synthetic Data on YOLOv9 for AI-Powered Poultry Farming
Published 2025-03-01Get full text
Article -
744
-
745
-
746
Towards Trustworthy Energy Efficient P2P Networks: A New Method for Validating Computing Results in Decentralized Networks
Published 2025-06-01“…Decentralized P2P networks have emerged as robust instruments to execute computing tasks, with enhanced security and transparency. …”
Get full text
Article -
747
SINGLE-PHOTON EMISSION COMPUTED TOMOGRAPHY IN COMBINATION WITH X-RAY COMPUTED TOMOGRAPHY IN THE STUDY OF LACRIMAL PASSAGES. FIRST RESULTS
Published 2016-02-01“…Objective: to explore the capabilities of single-photon emission computed tomography (SPECT) in combination with x-ray computed tomography (SPECT/CT) in the study of the anatomy and drainage function of lacrimal passages.Material and methods. …”
Get full text
Article -
748
-
749
-
750
Classification of Properties in Human-like Dialogue Systems Using Generative AI to Adapt to Individual Preferences
Published 2025-03-01Subjects: Get full text
Article -
751
A Comparison of the Meta Quest Pro and HTC Vive Focus 3 Eye-Tracking Systems: Analysis of Data Accuracy and Spatial Precision
Published 2025-01-01Subjects: Get full text
Article -
752
Version [1.0.3] — [CACP: Classification Algorithms Comparison Pipeline]
Published 2024-12-01Subjects: Get full text
Article -
753
Numerical modelling of a variable rate spraying drone and comparison to experimental evaluations
Published 2025-12-01“…Numerical simulations were conducted using X-Flow software, which employs Lattice Boltzmann Methods (LBM) to effectively model fluid behaviour within a specified computational domain. The experimental evaluation encompassed some tests on nozzle flow rates across different PWM frequencies and duty cycles. …”
Get full text
Article -
754
How to assess chest wall deformity in children with pectus excavatum - evaluation of the agreement among methods
Published 2021-01-01“…The study included 35 patients with PE, aged between 7 and 15 years. A noninvasive evaluation of chest deformity was carried out in all patients by photographic method (surrogate of clinical examination), native X-ray imaging, and computed tomography (CT), as well as by echocardiographic examination. …”
Get full text
Article -
755
-
756
-
757
CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING
Published 2016-09-01“…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
Get full text
Article -
758
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01“…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
Get full text
Article -
759
Trusted secure model for data services in cloud computing
Published 2014-10-01“…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
Get full text
Article -
760
Composite trapezoidal quadrature for computing hypersingular integrals on interval
Published 2024-12-01Get full text
Article