Search alternatives:
\\\"post » \\\"most (Expand Search)
\\\"pore » \\\"more (Expand Search)
Showing 1,361 - 1,380 results of 4,596 for search '"\"\\"((\\\"post preservation\\\") OR ((\\\"pore OR \\\"pose) presentation\\\"))\\"\""', query time: 0.19s Refine Results
  1. 1361

    Second order algorithm with convergence analysis for viscoelastic flow model by Chinedu Nwaigwe, Sanda Micula

    Published 2025-07-01
    “…This yielded a positivity preserving numerical scheme which is second order accurate. We pose and prove several Lemmas and Theorems to establish consistency, boundedness and convergence of the method. …”
    Get full text
    Article
  2. 1362

    Potentials and Challenges of Large Language Models (LLMs) in the Context of Administrative Decision-Making by Paulina Jo Pesch, Herwig C.H. Hofmann, Felix Pflücke

    Published 2025-03-01
    “…However, it is an open research question of how performant such domain-specific models could be. Furthermore, they pose legal challenges, touching especially upon administrative law, fundamental rights, data protection law, AI regulation, and copyright law. …”
    Get full text
    Article
  3. 1363

    Czy Prezydent Rzeczypospolitej Polskiej jest pracownikiem? Analiza zawodowego statusu głowy państwa w świetle art. 22 Kodeksu pracy by Damian Kazimierski

    Published 2025-06-01
    “…The final paragraphs of the text present selected cases of the employee nature of the president’s status in other countries – France, the United States and Brazil. …”
    Get full text
    Article
  4. 1364

    The Effect of Organizational Factors on the Mitigation of Information Security Insider Threats by Nader Sohrabi Safa, Hossein Abroshan

    Published 2025-06-01
    “…Insider threats pose significant challenges to organizations, seriously endangering information security and privacy protection. …”
    Get full text
    Article
  5. 1365

    Analytical Shaping of a Rocket Nose as a Stage of Preliminary Aerodynamic Modification by Adrian Szklarski, Robert Głębocki

    Published 2025-06-01
    “…The traditional design process relies on numerical methods such as CFD (Computational Fluid Dynamics) or machine learning techniques; however, the method presented here can serve as a first iteration to support the design. …”
    Get full text
    Article
  6. 1366

    Potential and economic feasibility of green hydrogen production from hydropower in Honduras by Zúniga-Paguada Cristian, Reyes-Duke Alicia María

    Published 2025-01-01
    “…Given the daily limitations of renewable generation, using green hydrogen as an energy vector for future reintegration into the electrical grid presents a more renewable solution. This alternative also offers potential applications such as electromobility. …”
    Get full text
    Article
  7. 1367

    A method for combing multi-beam bathymetric data to correct the deep sea sub-bottom profile by Weifeng Ding, Xia Feng, Na Li, Yinxia Fang

    Published 2025-04-01
    “…However, the complex topographic changes present in the deep ocean pose significant challenges in the exploration of the accuracy of deep-sea sub-bottom profiles. …”
    Get full text
    Article
  8. 1368

    Effective defense against physically embedded backdoor attacks via clustering-based filtering by Mohammed Kutbi

    Published 2025-04-01
    “…Abstract Backdoor attacks pose a severe threat to the integrity of machine learning models, especially in real-world image classification tasks. …”
    Get full text
    Article
  9. 1369

    Framework for Process Mining in Cargo Transportation Safety – PM2RCS by Jacira Salete Vieira dos Santos Bernardi, Eduardo Alves Portela Santos

    Published 2025-06-01
    “… Abstract Road accidents in cargo transportation pose significant challenges, adversely affecting both the economy and public safety. …”
    Get full text
    Article
  10. 1370

    Simultaneous TKA and Revision of Post-ORIF Patellar Non-union with Bone Grafting: A Case Report by Hiroko Sakamoto, Masaki Nagashima, Ryo Sasaki, Kentaro Tanaka, Mitsuru Yagi

    Published 2025-07-01
    “…In the elderly, multiple surgeries pose disadvantages because they increase the anesthetic risk and the incidence of perioperative complications and prolong the time required for functional recovery. …”
    Get full text
    Article
  11. 1371

    Achievements of Tibetan medicine and their reflection in Kalmyk Buddhist medical terminology: Tibetan-Oirat parallels, their semantics and etymology (based on written sources on th... by E. U. Omakaeva

    Published 2024-01-01
    “…Meanwhile, the terminology of this subject area is of particular research interest, deserving a holistic description of its various components. The main task is to pose the problem of constructing a Tibetan-Kalmyk-Russian thesaurus of traditional medical terminology, which requires a comprehensive study and systematization of key terms denoting generic objects of research, as well as sections and related disciplines of the subject area “Buddhist Medicine”. …”
    Get full text
    Article
  12. 1372

    Surgical treatment of uveal melanoma: Exoresection versus endoresection by Seung Min Lee, Min Kim

    Published 2025-01-01
    “…These surgical interventions can be implemented particularly for tumors exceeding traditional size criteria for plaque brachytherapy and for tumors that are too large, which pose an elevated risk of radiation-related complications. …”
    Get full text
    Article
  13. 1373

    Safeguarding accuracy for CT imaging with industrial robots: Efficient calibration methods for arbitrary trajectories by Anton Weiss, Simon Wittl, Gabriel Herl, Simon Zabler, Anna Trauth, Markus G. R. Sause

    Published 2025-02-01
    “…For example in a twin robot computed tomography system, acquisition geometries with arbitrary tool poses can be realized. In scientific applications, the quality of the CT volume image is of primary interest, whereas in an industrial environment it is often a matter of balancing quality and acquisition time. …”
    Get full text
    Article
  14. 1374

    Early detection of plant leaf diseases using stacking hybrid learning. by Abdullah Sheneamer

    Published 2024-01-01
    “…The early identification of pests and diseases in crops now presents a significant challenge. Different methods have been used to resolve this problem. …”
    Get full text
    Article
  15. 1375

    Characterization of sludge from the tailings with fly ash and red mud after the process of solidification/stabilization by Tomin Milena Bečelić, Miladin Gligorić

    Published 2018-03-01
    “…The paper presents the problem of waste sludge from mine tailing 'Sasa" contaminated with toxic metals, as well as the treatment of process solidification/stabilization. …”
    Get full text
    Article
  16. 1376

    On the Minimum Cable Tensions for the Cable-Based Parallel Robots by Peng Liu, Yuanying Qiu, Yu Su, Jiantao Chang

    Published 2014-01-01
    “…Then, a noniterative polynomial-based optimization algorithm with the proper optimal objective function is presented based on the convex optimization theory, in which the minimum cable tension at any pose is determined. …”
    Get full text
    Article
  17. 1377

    Juvenile Ossifying Fibroma of the Mandible: a Case Report by Bahar Keles, Mutlu Duran, Yavuz Uyarhttp://www.doaj.org/restricted, Ahmet Azimov, Abdullah Demirkan, Haci Hasan Esen

    Published 2010-04-01
    “…Background: Fibro-osseous lesions of the jaws, including juvenile ossifying fibroma, pose diagnostic and therapeutic difficulties due to their clinical, radiological and histological variability. …”
    Get full text
    Article
  18. 1378

    Geometric Shaping for Distortion-Limited Intensity Modulation/Direct Detection Data Center Links by Ethan M. Liang, Joseph M. Kahn

    Published 2023-01-01
    “…Intra-data center links are subject to transmission impairments that pose challenges for efficient scaling of per-wavelength data rates beyond 100 Gb/s. …”
    Get full text
    Article
  19. 1379

    Possibilities of Using Artificial Intelligence in Security Analysis by Maciej Norbert Ciesielski

    Published 2024-12-01
    “…Objectives The aim of the article is to present the characteristics and analytical potential of artificial intelligence in the area of ​​security analysis. …”
    Get full text
    Article
  20. 1380

    Chemoradiotherapy for recurrent CBTs case report by Guangyu Liu, Shuangyan Zhao, Jiankai Wang, Xiaoyu Duan, Hongyi Cai

    Published 2025-08-01
    “…While surgical resection remains the standard treatment, postoperative recurrence poses a clinical challenge. Case presentation We describe a 49-year-old female with recurrent CBT involving the jugular foramen, managed with IGRT (60 Gy/30 fractions) and 4 cycles of CVD chemotherapy. …”
    Get full text
    Article