Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1161
A Comprehensive Review of Performance Metrics for Computer-Aided Detection Systems
Published 2024-11-01“…This paper aims to provide a structured analysis of the performance metrics used in computer-aided detection (CAD) systems, specifically focusing on lung nodule detection in computed tomography (CT) images. …”
Get full text
Article -
1162
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01“…To classify the requests in convolutional neural network the use of character embedding for representing the string of a domain name is proposed. Quality evaluation of the trained neural network used for recognition of data exfiltration through domain name system using ROC-analysis is performed.The paper presents the software architecture used for deployment of trained neural network into existing infrastructure of the domain name system targeting practical computer networks protection from data exfiltration. …”
Get full text
Article -
1163
Reliability of communication networks with delay constraints: computational complexity and complete topologies
Published 2004-01-01“…If the edges fail randomly and independently with known probabilities (vertices are always operational), the diameter-constrained K-terminal reliability of G, RK(G,D), is defined as the probability that surviving edges span a subgraph whose K-diameter does not exceed D. In general, the computational complexity of evaluating RK(G,D) is NP-hard, as this measure subsumes the classical K-terminal reliability RK(G), known to belong to this complexity class. …”
Get full text
Article -
1164
Cone Beam Computed Tomography in Oral Cancer: A Scoping Review
Published 2025-05-01“…<b>Objectives</b>: The present scoping review aims to explore and provide an overview of the current applications of cone beam computed tomography (CBCT) in the management of oral cancer. …”
Get full text
Article -
1165
THE ROLE OF COMPUTED TOMOGRAPHY IN PATIENTS WITH GASTRIC CANCER IN RADIO-ONCOLOGICAL HOSPITAL
Published 2016-02-01“…Results. The role of computed tomography in the study of gastric carcinoma is mainly represented by the staging of tumor according to the TNM system; CT topometry; assessment of response to neoadjuvant therapy; evaluation of postoperative complications and the post-therapy control. …”
Get full text
Article -
1166
Paravertebral Mass in a Patient with Hemolytic Anemia: Computed Tomographic Findings
Published 2010-01-01Get full text
Article -
1167
Development of Quizizz-based Learning Media on Basic Computer and Network Subjects
Published 2021-01-01“…This study aims to develop Quizizz in basic computer and network subjects as a learning medium and to see the validity, practicality, and effectiveness of Quizizz as a learning medium in Basic Computer and Network subjects. …”
Get full text
Article -
1168
OESOPHAGEAL DILATATION ON CHEST HIGH-RESOLUTION COMPUTED TOMOGRAPHY IN SYSTEMIC SCLEROSIS
Published 2025-03-01“…Material and Methods: The study included 86 patients. A retrospective evaluation was performed on the demographic data, biochemical and serological tests, and chest high-resolution computed tomography (HRCT) images of the patients. …”
Get full text
Article -
1169
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
Published 2025-03-01“…For example, for an AES evaluation that protects against t probes and e faults, we improve the randomness complexity of the state-of-the-art construction when t + e > 3, leading to an improvement of up to a factor of 2.41. …”
Get full text
Article -
1170
Research on Pork Cut and Freshness Determination Method Based on Computer Vision
Published 2024-12-01“…To improve the precision and efficiency of pork quality assessment, an automated detection method based on computer vision technology is proposed for evaluating different parts and freshness of pork. …”
Get full text
Article -
1171
Computational epitope-based vaccine design with bioinformatics approach; a review
Published 2025-01-01“…Finally, employing computational techniques, we can thoroughly evaluate the designed vaccine. …”
Get full text
Article -
1172
New Predictive Models for the Computation of Reinforced Concrete Columns Shear Strength
Published 2024-12-01“…The assessment methods for estimating the behavior of the complex mechanics of reinforced concrete (RC) structural elements were primarily based on experimental investigation, followed by the collective evaluation of experimental databases from the available literature. …”
Get full text
Article -
1173
A Comprehensive Review of Explainable Artificial Intelligence (XAI) in Computer Vision
Published 2025-07-01“…Explainable Artificial Intelligence (XAI) is increasingly important in computer vision, aiming to connect complex model outputs with human understanding. …”
Get full text
Article -
1174
Livestock Biometrics Identification Using Computer Vision Approaches: A Review
Published 2025-01-01“…This paper aims to comprehensively survey the techniques for individual livestock identification based on computer vision methods. It begins by elucidating the uniqueness of the primary biometric features of livestock, such as facial features, and their critical role in the recognition process. …”
Get full text
Article -
1175
Impact of contrast material on calcium burden by coronary computed tomography angiography
Published 2025-03-01“… Background: Coronary computed tomography angiography (CCTA) helps reveal complex coronary lesions and improves the success and complication rates of coronary interventions for the lesions. …”
Get full text
Article -
1176
Anatomical Variations and Morphometry of Carotid Sinus: A Computed Tomography Study
Published 2025-04-01“…Background: The radiological evaluation of the carotid sinus (CS) anatomy and its morphometry is essentially important for various surgical procedures involving the carotid bifurcation and the CS itself. …”
Get full text
Article -
1177
Structural-methodical model of computer program for control of theoretical knowledge of cadets
Published 2018-06-01“…Basically, readymade computer programs are used, which are universal and are intended for wide application, without taking into account the specifics of Universities.Research and development of structural and methodological model was carried out with the use of theoretical analysis of the provisions of pedagogy on the problems of control, evaluation and analysis of the level of theoretical knowledge, methods of theory of algorithms and decision-making, methods of synthesis and analysis of information processes. …”
Get full text
Article -
1178
Synthesis of a reversible quantum Vedic multiplier on IBM quantum computers
Published 2025-05-01“…Abstract Quantum computers provide considerable potential to enhance computing technology, anticipated to surpass conventional computers by resolving intricate challenges that existing systems cannot tackle. …”
Get full text
Article -
1179
Improved computation of genomic and pedigree inbreeding and relationships accounting for the X chromosome
Published 2025-06-01“…Allele frequency also affects the computation of Fgen. Programs to compute pedigree and genomic measures were revised to improve speed and memory use, as well as to better account for the X chromosome. …”
Get full text
Article -
1180