Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1241
Dental photon-counting computed tomography for the assessment of peri-implant structures
Published 2025-08-01“…Abstract Purpose To assess the diagnostic performance of photon-counting computed tomography (PCCT) in the imaging of peri-implant bone structures and to compare it quantitatively and qualitatively to cone-beam computed tomography (CBCT). …”
Get full text
Article -
1242
Size-Specific Dose Estimate and Effective Dose for Pediatric Computed Tomography
Published 2025-01-01“…The water-equivalent diameter (Dw), SSDE, and E were computed for each examination using the dose report of CT console display computed tomography dose index (CTD1vol) and dose length product (DLP). …”
Get full text
Article -
1243
Computer Program for Primer Design for Loop-Mediated Isothermal Amplification (LAMP)
Published 2024-03-01“…Therefore, there is a need to use modern computer technologies. More than 150 computer programs have been proposed for the design of PCR primers, while for LAMP-primers there are less than 10 of them, and each of them has a number of drawbacks, e.g., in terms of the length of the analyzed site. …”
Get full text
Article -
1244
Computational Fluid Dynamics Analysis of Ballast Water Treatment System Design
Published 2025-04-01“…This study employs computational fluid dynamics (CFD) to analyze turbulent seawater flow in a real-case BWTS installed on a self-discharging bulk carrier. …”
Get full text
Article -
1245
A computational framework to characterize and compare the tonal repertoires of toothed whales
Published 2025-07-01Get full text
Article -
1246
Computational prediction of deleterious nonsynonymous SNPs in the CTNS gene: implications for cystinosis
Published 2025-05-01“…Clinically, cystinosis most often presents with renal Fanconi syndrome, photophobia and vision loss due to corneal cystine crystals, and progressive neuromuscular complications such as distal myopathy and swallowing difficulties This study aimed to identify deleterious nsSNPs in the CTNS gene and evaluate their effects on cystinosin stability, structure, and function via computational tools and molecular dynamics simulations. …”
Get full text
Article -
1247
Diagnosis of gastrointestinal fistulas in pancreatic necrosis by X-ray and computed tomography
Published 2025-01-01“…All patients underwent computed tomography (CT) of the abdominal cavity and retroperitoneal space with bolus contrast enhancement and X-ray fistulography. …”
Get full text
Article -
1248
Validation of Artificial Intelligence Computer-Aided Detection of Colonic Neoplasm in Colonoscopy
Published 2024-12-01“…In this study, we aimed to validate a previously developed artificial intelligence (AI) computer-aided detection (CADe) algorithm called ALPHAON<sup>®</sup> and compare outcomes with previous studies that showed that AI outperformed and assisted endoscopists of diverse levels of expertise in detecting colon polyps. …”
Get full text
Article -
1249
The Condition Evaluation of Bridges Based on Fuzzy BWM and Fuzzy Comprehensive Evaluation
Published 2025-03-01“…These advancements provide a scientifically rigorous yet practical tool for bridge management, balancing computational efficiency with evaluation accuracy to support maintenance decisions.…”
Get full text
Article -
1250
-
1251
Fault-tolerant and mobility-aware loading via Markov chain in mobile cloud computing
Published 2025-05-01“…However, mobile devices’ limited memory, computing power, and battery life pose significant challenges to their widespread use. …”
Get full text
Article -
1252
Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques
Published 2025-03-01“…Finally, we provide a comprehensive evaluation of both single-objective and multi-objective IoT service placement strategies in fog computing. …”
Get full text
Article -
1253
A real time monitoring system for accurate plant leaves disease detection using deep learning
Published 2025-02-01Subjects: Get full text
Article -
1254
A Biologically Inspired Trust Model for Open Multi-Agent Systems That Is Resilient to Rapid Performance Fluctuations
Published 2025-05-01Subjects: “…computational trust models…”
Get full text
Article -
1255
Impacts of geometric factors on the hydrothermal characteristics in a shell and cone-shaped coil heat exchanger
Published 2024-11-01Subjects: Get full text
Article -
1256
A Survey on Multi-User Conversational Interfaces
Published 2025-06-01Subjects: Get full text
Article -
1257
An efficient and secure quantum blind signature‐based electronic cash transaction scheme
Published 2024-12-01“…The authors’ findings indicate a robust eCash transaction model capable of withstanding the challenges posed by quantum computing advancements.…”
Get full text
Article -
1258
Zero Trust Strategies for Cyber-Physical Systems in 6G Networks
Published 2025-03-01Get full text
Article -
1259
Split Edge-Cloud Neural Networks for Better Adversarial Robustness
Published 2024-01-01“…Cloud computing is a critical component in the success of 5G and 6G networks, particularly given the computation-intensive nature of emerging applications. …”
Get full text
Article -
1260
A hybrid fog-edge computing architecture for real-time health monitoring in IoMT systems with optimized latency and threat resilience
Published 2025-07-01“…To address these challenges, we propose a Hybrid Fog-Edge Computing Architecture tailored for effective real-time health monitoring in IoMT systems. …”
Get full text
Article