Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
26061
Optimal dimensions of steel welded beams with hinged support units
Published 2023-11-01“…To determine the optimal dimensions of beams, the first derivative of the potential energy of elastic deformation over the height of the beam was calculated to establish the optimal dimensions of the beams, and the obtained result made it possible to compute the ratio of the height and thickness of the beam web to the width and thickness of the beam girdle. …”
Get full text
Article -
26062
Investigation of customized total knee implant with articular cartilage under loading conditions using finite element analysis.
Published 2025-01-01“…The research analyses patient-specific customized knee implants with articular cartilages under both pre- and post-implant conditions using a finite element model (FEM). Computed tomography (CT) images of patients were utilized to create a solid model, which was then analysed under various constraints and conditions. …”
Get full text
Article -
26063
Prevalence of Malaria among Adults in Ethiopia: A Systematic Review and Meta-Analysis
Published 2021-01-01“…The meta-analysis was computed using STATA version 14. The pooled prevalence estimates with 95% confidence interval were analyzed using a random-effect model, and the possible source of heterogeneity across studies was indicated through subgroup analysis, inverse of variance (I2), and time series analysis. …”
Get full text
Article -
26064
Single-Center Clinical Analysis of Traumatic Thoracic Aortic Injuries: A Retrospective Observational Study
Published 2021-06-01“…Demographics, physiological data, injury mechanism, hemodynamic parameters associated with the thoracic injury according to chest computed tomography (CT) findings, the timing of the intervention, and clinical outcomes were reviewed. …”
Get full text
Article -
26065
Monte Carlo Simulation of Gamma and Neutron Shielding with High-performance Ultra-heavy Cement Composite
Published 2024-12-01“…Materials and Methods: To extract such features, it is necessary to use a computational method. In this research, we have done all our calculations based on the Geant4 tool based on the Monte Carlo method. …”
Get full text
Article -
26066
Digital eye strain: prevalence and associated socio-demographic factors among banking assistants in Colombo District, Sri Lanka
Published 2025-01-01“…DES was detected using Computer Vision Syndrome Questionnaire (CVS-Q). Selected factors were cross-tabulated by the presence or absence of DES and the association was assessed using Chi-squared followed by multiple logistic regression. …”
Get full text
Article -
26067
Clinical Application of Inferior Alveolar Nerve Block Device for Safe and Secure IANB by Any Operator
Published 2023-01-01“…IANB was performed using the device on five patients who had undergone detailed computed tomography examination for chronic orofacial pain in the third division of the trigeminal nerve. …”
Get full text
Article -
26068
Trabeculectomy versus stepwise treatment for breaking the attack of acute primary angle closure in patients with long attack duration: study design and protocol for a multicentre r...
Published 2025-02-01“…Eligible participants will be identified at either emergency department or glaucoma clinics, then randomised into stepped treatment group or trabeculectomy group using a computer central randomisation service. The patients will be followed up for 1 year after initial treatment.Main outcomes and measures The primary outcome is logMAR BCVA 1 year post initial treatment. …”
Get full text
Article -
26069
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01“…As the cornerstone of blockchain technology, consensus technology has received more attention with the continuous development of blockchain technology.The development of consensus technology has become more and more rapid, but there are still related problems.Nowadays, fault-tolerant consensus algorithms, as one of the representative blockchain consensus technologies, still have many problems to be studied.The problem of node randomness and node collusion attacks in fault-tolerant consensus algorithms had been studied, and a game-theoretic-based anti-corruption algorithm was proposed.The global randomization consensus algorithm of collusion attack improved the security and throughput of the blockchain network by realizing the randomization of nodes and solving related security problems.In the process of selecting nodes participating in the fault-tolerant consensus algorithm, the global randomization of the initiator and verifier nodes was realized by using the mapping function and the weighted random function, thereby ensuring the identity anonymity of the initiator and verifier nodes and improving the blockchain network security accordingly.The reputation update model was used to realize the dynamic update of the reputation, and the game theory was used to analyze the security problems of the fault-tolerant consensus algorithm.A more correct and efficient algorithm model was constructed to improve the throughput of the algorithm and analyze the problem of collusion attack of more than one third of the nodes in this kind of algorithm, the refined Bayesian game was used to construct a collusion contract and analyze the collusion The Nash equilibrium point between the two nodes was adopted to solve the collusion attack problem of more than one third of the nodes.The security analysis and experiments show that the global randomization consensus algorithm based on the game theory anti-collusion attack is better than PoW、PoS and PBFT.The consensus algorithm is not only effective to improve throughput and reduce computing resource consumption, but also resistant to DDoS, Eclipse attacks and collusion attacks by more than one third of nodes.…”
Get full text
Article -
26070
Comparative Analysis of 95 Patients with Different Severity in the Early Outbreak of COVID-19 in Wuhan, China
Published 2020-01-01“…All patients had abnormal chest computed tomography, showing patchy shadows or ground-glass opacities. …”
Get full text
Article -
26071
Quadratic programming model for calibration of mine ventilation network under limited measured air quantities
Published 2024-12-01“…The existence of the model solution was analyzed based on the KKT (Karush-Kuhn-Tucker) conditions in optimization theory, and a computer program has been developed and applied in a calculation example containing 35 branches. …”
Get full text
Article -
26072
БЕЗПЕРЕРВНИЙ ПРОФЕСІЙНИЙ РОЗВИТОК – СТАВЛЕННЯ ЛІКАРІВ
Published 2020-12-01“…The study was conducted through the anonymous on-line survey (Computer Assisted Web Interviewing) of doctors in Odesa using the original questionnaire. …”
Get full text
Article -
26073
Explication of Pharmacological Proficiency of Phytoconstituents from Adansonia digitata Bark: An In Vitro and In Silico Approaches
Published 2024-01-01“…The GC-MS and FT-IR studies revealed phytocompounds, which were then analyzed for their potential therapeutic properties. Computational studies were conducted on the phytocompounds against Pseudomonas aeruginosa and C2 kinase (antioxidant). …”
Get full text
Article -
26074
A decision-making method for supplier selection in industrial manufacturing industry: A mathematical framework of integrating analytical hierarchical process and reliability risk e...
Published 2025-03-01“…The entropy method is applied to calculate the weights of different attributes, which are then used to compute the Relative Reliability Risk Index. The alternative functionality graph displays the strengths and weaknesses of all alternatives concerning multiple attributes. …”
Get full text
Article -
26075
Syphilitic aortitis: from the past to the present (view of a dermatovenerologist)
Published 2024-12-01“…The most informative methods for detecting late cardiovascular damage are: enzyme-linked immunosorbent assay, passive hemagglutination reaction, immunoblotting and computed tomography of the heart and echocardiography. …”
Get full text
Article -
26076
Microwave Thermal Ablation in an Unusual Case of Malignant and Locally Advanced Rare Tumor of Pancreas in ASA IV Old Male Patient and Literature Review
Published 2018-01-01“…The patient underwent computed tomography (CT), percutaneous biopsy, and an endoscopic positioning of prosthesis in the biliary tree. …”
Get full text
Article -
26077
Treatment of posttraumatic thoracolumbar fractures using SpineJack for vertebral body augmentation, a single-center retrospective, and observational cohort study of 226 cases
Published 2024-12-01“…The main outcome measure was the height of the vertebral body (anterior/middle/posterior parts) on the sagittal computed tomography scan. The secondary outcome measures were a 11-point Likert scale for the pain and the Oswestry Disability Questionnaire for the quality of life. …”
Get full text
Article -
26078
Bellini Duct Carcinoma Misdiagnosed with Urothelial Papillary Carcinoma
Published 2020-01-01“…Initial lab tests were normal. Computed tomography revealed a 5 cm solid mass of the left renal pelvis and multiple infracentimetric perihilar lymph nodes. …”
Get full text
Article -
26079
Impact of Post-Thaw Incubation Time of Frozen Embryos on Clinical Pregnancy Rate
Published 2023-01-01“…Statistical Analysis Used: Statistical analysis was performed using version 14 R software version 4.0.1 (2020-06-06) (R foundation for Statistical Computing, Vienna, Austria). A P < 0.05 is taken as significant. …”
Get full text
Article -
26080
Microsimulation models on child and adolescent health: a scoping review protocol
Published 2025-02-01“…Introduction Microsimulation models are computer-based models, which can be employed to simulate the behaviour of microagents, such as children and adolescents, to understand the potential behavioural and economic effects of health interventions or policies. …”
Get full text
Article