Showing 26,081 - 26,100 results of 28,739 for search '"computability"', query time: 0.14s Refine Results
  1. 26081

    Hysterectomy Sparing Management of Uterine Necrosis following Uterine Artery Embolization for Postpartum Hemorrhage by Myriam Chlela, Josette Dawkins, Gregory Lewis

    Published 2023-01-01
    “…On postoperative day 28, the patient presented with fever, vaginal discharge, and abdominal pain. An abdomino-pelvic computed tomography scan revealed areas of necrosis within the uterus secondary to recent UAE. …”
    Get full text
    Article
  2. 26082

    Malignant Paraganglioma With Calvarial Metastases Presenting With Recurrent Catecholamine-Induced Cardiomyopathy by Beatrice A. Brumley, MD, Run Yu, MD, PhD, Shadfar Bahri, MD, Jane Rhyu, MD

    Published 2025-01-01
    “…Seven months postoperatively, gallium-68 dodecane tetraacetic acid–octreotate positron emission tomography/computed tomography showed no recurrence at the surgical site, stable occipital lesion, and additional skeletal metastases. …”
    Get full text
    Article
  3. 26083

    Severe pneumonia due to concurrent Legionella pneumophila and Acinetobacter baumannii infections: a case report by Xiaoming Yang, Zhongda Liu, Xiaojing Liu, Quan Li, Hui Huang, Yibo Wei, Tao Sun

    Published 2025-01-01
    “…Case presentation A 45-year-old male presented to our hospital with a productive cough and fever after staying in a local hotel. His chest computed tomography (CT) scan showed bilateral lower-lobe infiltration and left pleural effusion. …”
    Get full text
    Article
  4. 26084

    Dynamic Coupling Analysis of Vehicle-Bridge System for Long-Span Suspension Bridge Based on Backpropagation Neural Network Method by Zuolong Luo, Xiaobo Zheng, Haoyun Yuan, Xirong Niu

    Published 2020-01-01
    “…Conventional method such as finite element method (FEM) for dynamic coupling analysis of vehicle-bridge system often requires separate iteration of vehicle system and bridge system, and the contact and coupling interactions between them are used as the link for convergence inspection, which is too computationally intensive and time-consuming. In addition, the dynamic response of the vehicle-bridge coupling system obtained by FEM cannot be expressed explicitly, which is not convenient for engineering application. …”
    Get full text
    Article
  5. 26085

    Parallel-group, randomised, controlled, non-inferiority trial of high-flow nasal cannula versus non-invasive ventilation for emergency patients with acute cardiogenic pulmonary oed... by Apichaya Monsomboon, Onlak Ruangsomboon, Nattakarn Praphruetkit

    Published 2022-07-01
    “…Therefore, we planned this study to investigate the effects of HFNC compared with NIPPV for emergency patients with ACPE.Methods and analysis In this single-centred, non-blinded, parallel-group, randomised, controlled, non-inferiority trial, we will randomly allocate 240 patients visiting the emergency department with ACPE in a 1:1 ratio to receive either HFNC or NIPPV for at least 4 hours using computer-generated mixed-block randomisation concealed by sealed opaque envelopes. …”
    Get full text
    Article
  6. 26086

    Resident action in smart waste management during landfill disclosure transition: Insights from Yogyakarta's smart city initiatives by Sapta Suhardono, Chun-Hung Lee, Thi Thanh Thuy Phan, I Wayan Koko Suryawan

    Published 2025-06-01
    “…Adopting a mixed-methods approach, this study integrates advanced computational intelligence with qualitative insights into behavioral drivers. …”
    Get full text
    Article
  7. 26087

    Insulin Resistance Associated with Plasma Xanthine Oxidoreductase Activity Independent of Visceral Adiposity and Adiponectin Level: MedCity21 Health Examination Registry by Masafumi Kurajoh, Shinya Fukumoto, Takayo Murase, Takashi Nakamura, Takuma Ishihara, Hirofumi Go, Kouji Yamamoto, Shinya Nakatani, Akihiro Tsuda, Tomoaki Morioka, Katsuhito Mori, Yasuo Imanishi, Masaaki Inaba, Masanori Emoto

    Published 2019-01-01
    “…Plasma XOR activity, serum adiponectin level, and VFA obtained by computed tomography were measured, and insulin resistance was determined based on the homeostasis model assessment (HOMA-IR) index. …”
    Get full text
    Article
  8. 26088

    Repurposing antiviral drugs targeting the PARP-1 and HER2 pathways with multifaceted impacts through integrated network analysis and molecular mechanics by Uma Maheshwari Mugundan, Praveen Sekar, Rajanandh Muhasaparur Ganesan

    Published 2025-06-01
    “…This study investigates the anticancer potential of existing anti-viral drugs using a comprehensive suite of computational methods. A dataset of 76 antiviral drugs was prepared and optimized for analysis. …”
    Get full text
    Article
  9. 26089

    In-House Fabrication and Validation of 3D-Printed Custom-Made Medical Devices for Planning and Simulation of Peripheral Endovascular Therapies by Arianna Mersanne, Ruben Foresti, Chiara Martini, Cristina Caffarra Malvezzi, Giulia Rossi, Anna Fornasari, Massimo De Filippo, Antonio Freyrie, Paolo Perini

    Published 2024-12-01
    “…<b>Methods:</b> Ten custom-made 3D-printed vascular models were produced using computed tomography angiography (CTA) scans of ten patients diagnosed with PAD. …”
    Get full text
    Article
  10. 26090

    Scenarios of automated driving based on a switchboard for driving forces - an application to the Netherlands by Maaike Snelder, Koen de Clercq, Gonçalo Homem de Almeida Correia, Maarten 't Hoen, Irene Martinez, Shadi Sharif Azadeh, Bart van Arem

    Published 2025-01-01
    “…For each scenario, a modelling approach is used to compute the impact of automated driving on vehicle kilometres driven and congestion. …”
    Get full text
    Article
  11. 26091

    Magnetic resonance imaging -based radiomics of the pituitary gland is highly predictive of precocious puberty in girls: a pilot study by Michele Maddalo, Maddalena Petraroli, Francesca Ormitti, Alice Fulgoni, Margherita Gnocchi, Marco Masetti, Eugenia Borgia, Benedetta Piccolo, Emanuela C. Turco, Viviana D. Patianna, Nicola Sverzellati, Susanna Esposito, Susanna Esposito, Caterina Ghetti, Maria E. Street, Maria E. Street

    Published 2025-02-01
    “…Pearson correlation between RFs and auxological, biochemical, and ultrasound data was also computed.ResultsTwo different radiomic parameters, Shape Surface Volume Ratio and Glrlm Gray Level Non-Uniformity, predicted CPP with a high diagnostic accuracy (ROC-AUC 0.81 ± 0.08) through the application of our ML algorithm. …”
    Get full text
    Article
  12. 26092

    Urban Environment Transformation, Taking into Account Image Perception and Participation of Residents (Basmanny District in Central Moscow) by D. O. Babkina, O. I. Adamov

    Published 2023-09-01
    “…Scientific novelty is that in addition to the territory historical and genetic analysis, the computer and Data-Base resources were involved to reach the objectives. …”
    Get full text
    Article
  13. 26093

    Thermal Response and Degressive Reaction Study of Oxo-Biodegradable Plastic Products Exposed to Various Degradation Media by S. M. Al-Salem, A. Y. Al-Nasser, M. H. Behbehani, H. H. Sultan, H. J. Karam, M. H. Al-Wadi, A. T. Al-Dhafeeri, Z. Rasheed, M. Al-Foudaree

    Published 2019-01-01
    “…The methodology used followed the International Confederation for Thermal Analysis and Calorimetry (ICTAC) recommendation for thermal stability and the computation of kinetic parameters. The degradation reaction kinetics were also determined postexposure to degressive media. …”
    Get full text
    Article
  14. 26094

    APOE4 and infectious diseases jointly contribute to brain glucose hypometabolism, a biomarker of Alzheimer's pathology: New findings from the ADNI. by Aravind Lathika Rajendrakumar, Konstantin G Arbeev, Olivia Bagley, Matt Duan, Anatoliy I Yashin, Svetlana Ukraintseva, Alzheimer’s Disease Neuroimaging Initiative

    Published 2025-01-01
    “…Marginal mean estimates for infections, stratified by APOE4 carrier status, were then computed.<h4>Results</h4>Prior infections were associated with greater HCI [β = 0.15, 95% CI: 0.03, 0.27, p = 0.01]. …”
    Get full text
    Article
  15. 26095

    Patterns Of HRCT In Patients with Pulmonary Tuberculosis At A Tertiary Care Hospital by Sohail Anwar, Arsalan Nawaz, Imran Ahmed Moinuddin, Muhammad Kashif, Asim Mumtaz, Muhammad Ijaz Bhatti

    Published 2024-06-01
    “… Abstract: Background: With the advancement in biomedical engineering and imaging technology, HRCT scan has emerged as more effective tool than standard1computed tomography scan & traditional chest radiography in detecting pulmonary pathologies including pulmonary tuberculosis. …”
    Get full text
    Article
  16. 26096

    Evaluation of one-point fixation for zygomaticomaxillary complex fractures using a three-dimensional photogrammetric analysis by Se Young Kim, Seung Min Nam, Eun Soo Park, Yong Bae Kim

    Published 2019-07-01
    “…The differences in bony inter-malar height between the fractured and unfractured sides were evaluated using computer tomography at the pre-operative and 6 months after surgery. …”
    Get full text
    Article
  17. 26097

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&amp;CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&amp;CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  18. 26098

    Descriptive study of the role of ultrasound in the evaluation of patients with interstitial lung disease associated with autoimmune connective tissue disorders by Varghese Koshy, Kiran Patel, Deep Yadav, Puneet Saxena, R A George, Vandana Gangadharan, George Koshy

    Published 2023-01-01
    “…Background and Aim: High-resolution computed tomography (HRCT) of the chest has been the conventionally accepted modality of radiological investigation utilized in the evaluation and management of interstitial lung diseases (ILDs). …”
    Get full text
    Article
  19. 26099

    Designing a prototype trauma registry framework for a tertiary health institution in a low- and middle-income country: A qualitative study. by Helen Adesoba, Adesola Olumide, Kehinde Oluwadiya, Ajibola Oladiran, Kehinde Ojifinni, Oluwafemi Popoola, Carl Bonander

    Published 2025-01-01
    “…Following this scope, the analysis led to the identification of 21 essential components and activities for the TR, which were then organised into six categories: registry personnel, computers and other materials, trainings, technology infrastructure, administrative services, and monitoring and evaluation.…”
    Get full text
    Article
  20. 26100

    Design of miner type identification mechanism based on reputation management model by Jiaren YU, Youliang TIAN, Hui LIN

    Published 2022-02-01
    “…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
    Get full text
    Article