Suggested Topics within your search.
Suggested Topics within your search.
-
641
Open Access to Burn Severity Data—A Web-Based Portal for Mainland Portugal
Published 2025-02-01“…The platform provides open-access, multisource data from satellite missions, including MODIS, Landsat-5, -7, and -8, and Sentinel-2. …”
Get full text
Article -
642
Predictive interpretable analytics models for forecasting healthcare costs using open healthcare data
Published 2024-12-01Get full text
Article -
643
Querying 3D point clouds exploiting open-vocabulary semantic segmentation of images
Published 2024-12-01Get full text
Article -
644
Releasing the octoPus, an open-source digital tool to promote Integrated Pest Management
Published 2025-08-01“…To overcome this limitation, we developed the octoPus, the first open-source modelling tool designed to enhance the control of primary infections of grapevine downy mildew. …”
Get full text
Article -
645
Postoperative results after open-wedge high tibial osteotomy with lateral hinge fracture
Published 2025-06-01“…Background Lateral hinge fracture (LHF) is a known complication of open-wedge high tibial osteotomy (OWHTO), potentially resulting in postoperative instability, displacement, loss of correction, malunion, and non-union. …”
Get full text
Article -
646
A Comprehensive Review of Open Caisson Modeling Technology: Current Practices and Future Prospects
Published 2025-05-01“…Compared with other geotechnical construction events, for instance, tunnelling, the literature relating to the ground deformations induced from open caisson shafts are comparatively limited. This review offers an evaluation of several case studies that utilize experimental and computational modeling techniques to provide clearer insights into earth pressure distribution and induced surface and subsurface soil displacements, as well as the associated ground deformations during open caisson shaft construction. …”
Get full text
Article -
647
Joint optimization of location and topology of multi-terminal soft open point in distribution networks
Published 2025-08-01Get full text
Article -
648
Valuation of Urban Public Bus Electrification with Open Data and Physics-Informed Machine Learning
Published 2023-01-01Get full text
Article -
649
-
650
JiuZhou: open foundation language models and effective pre-training framework for geoscience
Published 2025-08-01Get full text
Article -
651
Supporting adult-learners’ online interaction in computer-mediated learningOSF
Published 2024-12-01Get full text
Article -
652
Building a fusion-based quantum computer using teleported gates
Published 2025-06-01Get full text
Article -
653
Computation of Minimal Polynomials and Multivector Inverses in Non-Degenerate Clifford Algebras
Published 2025-03-01“…The demonstrated algorithms are implemented in the Clifford package of the open source computer algebra system Maxima. Symbolic and numerical examples residing in different Clifford algebras are presented.…”
Get full text
Article -
654
Correction: Computed tomography perfusion as a predictor of gastric cancer grades
Published 2024-10-01Get full text
Article -
655
Reconceptualisation of Architects’ Intentionality in Computational Form Generation: A Tripartite Model
Published 2018-04-01Get full text
Article -
656
Analysing Test-Takers’ Views on a Computer-Based Speaking Test
Published 2017-11-01“…This study examines test-takers’ views on a computer-delivered speaking test in order to investigate the aspects they consider most relevant in technology-based oral assessment, and to explore the main advantages and disadvantages computer-based tests may offer as compared to face-to-face speaking tests. …”
Get full text
Article -
657
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Get full text
Article -
658
Quantum computation of SU(2) lattice gauge theory with continuous variables
Published 2025-06-01Get full text
Article -
659
Accounting for contact network uncertainty in epidemic inferences with Approximate Bayesian Computation
Published 2025-04-01Get full text
Article -
660
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Get full text
Article