Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
26081
Hysterectomy Sparing Management of Uterine Necrosis following Uterine Artery Embolization for Postpartum Hemorrhage
Published 2023-01-01“…On postoperative day 28, the patient presented with fever, vaginal discharge, and abdominal pain. An abdomino-pelvic computed tomography scan revealed areas of necrosis within the uterus secondary to recent UAE. …”
Get full text
Article -
26082
Malignant Paraganglioma With Calvarial Metastases Presenting With Recurrent Catecholamine-Induced Cardiomyopathy
Published 2025-01-01“…Seven months postoperatively, gallium-68 dodecane tetraacetic acid–octreotate positron emission tomography/computed tomography showed no recurrence at the surgical site, stable occipital lesion, and additional skeletal metastases. …”
Get full text
Article -
26083
Severe pneumonia due to concurrent Legionella pneumophila and Acinetobacter baumannii infections: a case report
Published 2025-01-01“…Case presentation A 45-year-old male presented to our hospital with a productive cough and fever after staying in a local hotel. His chest computed tomography (CT) scan showed bilateral lower-lobe infiltration and left pleural effusion. …”
Get full text
Article -
26084
Dynamic Coupling Analysis of Vehicle-Bridge System for Long-Span Suspension Bridge Based on Backpropagation Neural Network Method
Published 2020-01-01“…Conventional method such as finite element method (FEM) for dynamic coupling analysis of vehicle-bridge system often requires separate iteration of vehicle system and bridge system, and the contact and coupling interactions between them are used as the link for convergence inspection, which is too computationally intensive and time-consuming. In addition, the dynamic response of the vehicle-bridge coupling system obtained by FEM cannot be expressed explicitly, which is not convenient for engineering application. …”
Get full text
Article -
26085
Parallel-group, randomised, controlled, non-inferiority trial of high-flow nasal cannula versus non-invasive ventilation for emergency patients with acute cardiogenic pulmonary oed...
Published 2022-07-01“…Therefore, we planned this study to investigate the effects of HFNC compared with NIPPV for emergency patients with ACPE.Methods and analysis In this single-centred, non-blinded, parallel-group, randomised, controlled, non-inferiority trial, we will randomly allocate 240 patients visiting the emergency department with ACPE in a 1:1 ratio to receive either HFNC or NIPPV for at least 4 hours using computer-generated mixed-block randomisation concealed by sealed opaque envelopes. …”
Get full text
Article -
26086
Resident action in smart waste management during landfill disclosure transition: Insights from Yogyakarta's smart city initiatives
Published 2025-06-01“…Adopting a mixed-methods approach, this study integrates advanced computational intelligence with qualitative insights into behavioral drivers. …”
Get full text
Article -
26087
Insulin Resistance Associated with Plasma Xanthine Oxidoreductase Activity Independent of Visceral Adiposity and Adiponectin Level: MedCity21 Health Examination Registry
Published 2019-01-01“…Plasma XOR activity, serum adiponectin level, and VFA obtained by computed tomography were measured, and insulin resistance was determined based on the homeostasis model assessment (HOMA-IR) index. …”
Get full text
Article -
26088
Repurposing antiviral drugs targeting the PARP-1 and HER2 pathways with multifaceted impacts through integrated network analysis and molecular mechanics
Published 2025-06-01“…This study investigates the anticancer potential of existing anti-viral drugs using a comprehensive suite of computational methods. A dataset of 76 antiviral drugs was prepared and optimized for analysis. …”
Get full text
Article -
26089
In-House Fabrication and Validation of 3D-Printed Custom-Made Medical Devices for Planning and Simulation of Peripheral Endovascular Therapies
Published 2024-12-01“…<b>Methods:</b> Ten custom-made 3D-printed vascular models were produced using computed tomography angiography (CTA) scans of ten patients diagnosed with PAD. …”
Get full text
Article -
26090
Scenarios of automated driving based on a switchboard for driving forces - an application to the Netherlands
Published 2025-01-01“…For each scenario, a modelling approach is used to compute the impact of automated driving on vehicle kilometres driven and congestion. …”
Get full text
Article -
26091
Magnetic resonance imaging -based radiomics of the pituitary gland is highly predictive of precocious puberty in girls: a pilot study
Published 2025-02-01“…Pearson correlation between RFs and auxological, biochemical, and ultrasound data was also computed.ResultsTwo different radiomic parameters, Shape Surface Volume Ratio and Glrlm Gray Level Non-Uniformity, predicted CPP with a high diagnostic accuracy (ROC-AUC 0.81 ± 0.08) through the application of our ML algorithm. …”
Get full text
Article -
26092
Urban Environment Transformation, Taking into Account Image Perception and Participation of Residents (Basmanny District in Central Moscow)
Published 2023-09-01“…Scientific novelty is that in addition to the territory historical and genetic analysis, the computer and Data-Base resources were involved to reach the objectives. …”
Get full text
Article -
26093
Thermal Response and Degressive Reaction Study of Oxo-Biodegradable Plastic Products Exposed to Various Degradation Media
Published 2019-01-01“…The methodology used followed the International Confederation for Thermal Analysis and Calorimetry (ICTAC) recommendation for thermal stability and the computation of kinetic parameters. The degradation reaction kinetics were also determined postexposure to degressive media. …”
Get full text
Article -
26094
APOE4 and infectious diseases jointly contribute to brain glucose hypometabolism, a biomarker of Alzheimer's pathology: New findings from the ADNI.
Published 2025-01-01“…Marginal mean estimates for infections, stratified by APOE4 carrier status, were then computed.<h4>Results</h4>Prior infections were associated with greater HCI [β = 0.15, 95% CI: 0.03, 0.27, p = 0.01]. …”
Get full text
Article -
26095
Patterns Of HRCT In Patients with Pulmonary Tuberculosis At A Tertiary Care Hospital
Published 2024-06-01“… Abstract: Background: With the advancement in biomedical engineering and imaging technology, HRCT scan has emerged as more effective tool than standard1computed tomography scan & traditional chest radiography in detecting pulmonary pathologies including pulmonary tuberculosis. …”
Get full text
Article -
26096
Evaluation of one-point fixation for zygomaticomaxillary complex fractures using a three-dimensional photogrammetric analysis
Published 2019-07-01“…The differences in bony inter-malar height between the fractured and unfractured sides were evaluated using computer tomography at the pre-operative and 6 months after surgery. …”
Get full text
Article -
26097
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&amp;CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&amp;CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
26098
Descriptive study of the role of ultrasound in the evaluation of patients with interstitial lung disease associated with autoimmune connective tissue disorders
Published 2023-01-01“…Background and Aim: High-resolution computed tomography (HRCT) of the chest has been the conventionally accepted modality of radiological investigation utilized in the evaluation and management of interstitial lung diseases (ILDs). …”
Get full text
Article -
26099
Designing a prototype trauma registry framework for a tertiary health institution in a low- and middle-income country: A qualitative study.
Published 2025-01-01“…Following this scope, the analysis led to the identification of 21 essential components and activities for the TR, which were then organised into six categories: registry personnel, computers and other materials, trainings, technology infrastructure, administrative services, and monitoring and evaluation.…”
Get full text
Article -
26100
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article