Showing 26,161 - 26,180 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 26161

    Experimental Studies of Fluid Flow Resistance in a Heat Exchanger Based on the Triply Periodic Minimal Surface by Marcin Kruzel, Krzysztof Dutkowski, Tadeusz Bohdal

    Published 2025-01-01
    “…They mainly concern computer simulations that have yet to be experimentally verified. …”
    Get full text
    Article
  2. 26162

    Prevalence and factors associated with false hyperkalaemia in Asians in primary care: a cross-sectional study (the Unlysed Hyperkalaemia- the Unseen Burden (UHUB) study) by Ngiap Chuan Tan, Alicia Ying Ying Boo, Yi Ling Eileen Koh, Pei Lin Hu

    Published 2020-09-01
    “…The proportion of such patients was computed to determine its prevalence. Linear and logistic regressions were used to identify the associated factors.Results The study population comprised of 3014 index cases, of which 1575 had repeat potassium tests without preceding SPS. 86.4% (1362/1575) of them had potassium ≤5.5 mmol/L. …”
    Get full text
    Article
  3. 26163

    Experimental and Theoretical Study on the Failure of Sandwich Specimens with Tabs under Four-Point Bending by V. N. Paimushin, S. A. Kholmogorov, M. V. Makarov, N. V. Levshonkova

    Published 2024-07-01
    “…The algorithm of the developed method was implemented as an application software, which facilitated a series of computational experiments. The results obtained were compared with the experimental data on the four-point bending of sandwich specimens with the facing layers made of a unidirectional fiber-reinforced composite characterized by specific geometric and physico-mechanical properties, as well as with tabs under the loading rollers. …”
    Get full text
    Article
  4. 26164

    Survey on blockchain privacy protection techniques in cryptography by Feng LIU, Jie YANG, Jiayin QI

    Published 2022-08-01
    “…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
    Get full text
    Article
  5. 26165

    Design of an iterative method for enhanced early prediction of acute coronary syndrome using XAI analysis by Shital Hajare, Rajendra Rewatkar, K.T.V. Reddy

    Published 2024-08-01
    “…The study harnesses diverse algorithms—Support Vector Machines, Logistic Regression, Gradient Boosting Machines, and Deep Forest—tailored for nuanced ACS detection, balancing simplicity with computational depth to optimize performance metrics. …”
    Get full text
    Article
  6. 26166

    Evaluation of positions of four lingula shapes for mandibular ramus surgery by Kun-Jung Hsu, Kun-Jung Hsu, Pei-Jung Chen, Han-Sheng Chen, Han-Sheng Chen, Kun-Tsung Lee, Kun-Tsung Lee, Chun-Ming Chen, Chun-Ming Chen

    Published 2025-01-01
    “…The purpose of this study was to investigate the location of the lingula in both horizontal and vertical planes among four different shapes of the mandibular ramus.MethodsNinety patients, 60 female and 30 male, underwent cone beam computed tomography scans to evaluate the measurements of the lingula tip (Li) in relation to the anterior border (AB), posterior border (PB), sigmoid notch (SN), and inferior border (IB) of the ramus. …”
    Get full text
    Article
  7. 26167

    Transforming traffic accident investigations: a virtual-real-fusion framework for intelligent 3D traffic accident reconstruction by Yanzhan Chen, Qian Zhang, Fan Yu

    Published 2024-12-01
    “…This study proposes a novel virtual-real-fusion simulation framework that integrates traffic accident generation, unmanned aerial vehicle (UAV)-based image collection, and a 3D traffic accident reconstruction pipeline with advanced computer vision techniques and unsupervised 3D point cloud clustering algorithms. …”
    Get full text
    Article
  8. 26168

    Investigation of Sandstone Mesostructure Damage Caused by Freeze-Thaw Cycles via CT Image Enhancement Technology by Hui Liu, Gengshe Yang, Yehui Yun, Jianghao Lin, Wanjun Ye, Huimei Zhang, Yao Zhang

    Published 2020-01-01
    “…In this regard, this paper proposes a quantitative evaluation method based on computed tomography (CT) scanning technology for investigating the mesostructure and damage characteristics of sandstone subjected to freeze-thaw conditions. …”
    Get full text
    Article
  9. 26169

    Fully automated segmentation and classification of renal tumors on CT scans via machine learning by Jang Hee Han, Byung Woo Kim, Taek Min Kim, Ji Yeon Ko, Seung Jae Choi, Minho Kang, Sang Youn Kim, Jeong Yeon Cho, Ja Hyeon Ku, Cheol Kwak, Young-Gon Kim, Chang Wook Jeong

    Published 2025-01-01
    “…Materials and methods The model was developed using computed tomography (CT) images of pathologically proven renal tumors collected from a prospective cohort at a medical center between March 2016 and December 2020. …”
    Get full text
    Article
  10. 26170

    Educational creative task as the main teaching tool for formation of compositional abilities of prospective leaders of the studio of decorative and applied creativity by Ekaterina S. Sachkova

    Published 2018-06-01
    “…In the process of research the theoretical analysis of pedagogical, psychological, methodological literature on the problem of research and empirical methods: pedagogical observation, testing, stating and forming experiments.As a result of the research the specificity of compositional activity in the sphere of decorative and applied art is revealed, the definition and structure of compositional abilities of leaders of the Studio of decorative and applied creativity is formulated, the complex of pedagogical means of formation of compositional abilities of students of higher education institutions of culture and arts - prospective leaders of the Studio of decorative and applied creativity is developed and tested.The formation of compositional abilities of prospective leaders of the Studio of decorative and applied creativity is carried out in the process of specially organized activities, the main content of which is the solution in the prescribed manner and combinations of educational and creative composite tasks presented in various techniques of decorative and applied art and in computer performance, having a certain level of complexity, subjects and orientation. …”
    Get full text
    Article
  11. 26171

    Genetic Artificial Hummingbird Algorithm-Support Vector Machine for Timely Power Theft Detection by Emmanuel Gbafore, Davies Rene Segera, Cosmas Raymond Mutugi Kiruki

    Published 2024-01-01
    “…The methodology entailed data preprocessing, data split into training, validation, and testing sets in an 80-10-10 ratio, z-score normalization, optimization, training, validation, testing, and computation of six evaluation metrics. Its performance is compared with 13 metaheuristic classifiers and the conventional support vector machine. …”
    Get full text
    Article
  12. 26172

    Impact of morphological traits and irrigation levels on fresh herbage yield of sorghum x sudangrass hybrid: Modelling data mining techniques. by Halit Tutar, Senol Celik, Hasan Er, Erdal Gönülal

    Published 2025-01-01
    “…Plant height of 251.22 cm, stem diameter of 7.03 mm, fresh herbage yield of 8010.69 kg da-1, crude protein ratio of 9.09%, acid detergent fiber 33.23%, neutral detergent fiber 57.44%, acid detergent lignin 7.43%, dry matter digestibility of 63.01%, dry matter intake 2.11%, and relative feed value of 103.02 were the descriptive statistical values that were computed. Model fit statistics, including coefficient of determination (R2), adjusted R2, root of mean square error (RMSE), mean absolute percentage error (MAPE), standard deviation ratio (SD ratio), Mean Absolution Error (MAE) and Relative Absolution Error (RAE), were used to evaluate the prediction abilities of the fitted models. …”
    Get full text
    Article
  13. 26173

    Correlation between the Severity of Metabolic Dysfunction-Associated Fatty Liver Disease and Serum Uric Acid to Serum Creatinine Ratio by Jing Liu, Hongye Peng, Che Wang, Yutong Wang, Rongrui Wang, Jixiang Liu, Tianhui Zhou, Shukun Yao

    Published 2023-01-01
    “…Methods. 228 participants were enrolled and divided into 2 groups, including mild MAFLD and non-MAFLD group and moderate-severe MAFLD group, based on liver/spleen computed tomography (CT) ratios. The correlations between sUA/Cr and the severity of MAFLD were analyzed by logistic and linear regression. …”
    Get full text
    Article
  14. 26174

    In silico methods for immunogenicity risk assessment and human homology screening for therapeutic antibodies by Aimee E. Mattei, Andres H. Gutierrez, Soorya Seshadri, Jacob Tivin, Matt Ardito, Amy S. Rosenberg, William D. Martin, Anne S. De Groot

    Published 2024-12-01
    “…Even if the source of a given biologic is ‘fully human’, T cell epitopes that are contained in the sequences of the biologic may activate the immune system, enabling the development of anti-drug antibodies that can reduce drug efficacy and may contribute to adverse events. Computational tools that identify T cell epitopes from primary amino acid sequences have been used to assess the immunogenic potential of therapeutic candidates for several decades. …”
    Get full text
    Article
  15. 26175

    Information retrieval interfaces in virtual reality-A scoping review focused on current generation technology. by Maurice Schleußinger

    Published 2021-01-01
    “…The Information Retrieval user experience has remained largely unchanged since its inception for computers and mobile devices alike. However, recent developments in Virtual Reality hardware (pioneered by Oculus Rift in 2013) could introduce a new environment for Information Retrieval. …”
    Get full text
    Article
  16. 26176

    Prenatal exposure to polycyclic aromatic hydrocarbons and blood pressure in the early life of children by Xiaodong Chen, Lingling Dong, Lina Yang, Yan Yang, Liyu Yang, Sijia Han

    Published 2025-02-01
    “…Additionally, we applied quantile g-computation (g-comp) and Bayesian kernel machine regression (BKMR) to assess the combined and interaction effects of multiple PAH metabolites. …”
    Get full text
    Article
  17. 26177

    Design and modeling of a highly compact negative index floral shape metamaterial for flight navigation applications by M. Pallavi, Praveen Kumar, B. R. Shivakumar

    Published 2025-02-01
    “…The results indicate that the proposed structure retains its DNG behavior in the desired frequency range, regardless of the incident angles. The computed effective medium ratio of the structure is 13.47 at the CAS central frequency (1.06 GHz), highlighting its compactness and efficacy. …”
    Get full text
    Article
  18. 26178

    Reliability of Upper Extremity Functional Performance Tests for the Non-overhead Athlete by Bryan L Riemann, George J Davies

    Published 2023-10-01
    “…Measures of systematic bias, absolute reliability and relative reliability were computed between the sessions. Additionally, correlational analyses were conducted between the three UEFPT…”
    Get full text
    Article
  19. 26179

    Under a not so white sky: visual impacts of stratospheric aerosol injection by Ansar Lemon, David W Keith, Steve Albers

    Published 2025-01-01
    “…We use population density and AOD data to compute the distribution of AODs people experience and then simulate sky images for the 10th, 50th, and 90th percentiles of that distribution. …”
    Get full text
    Article
  20. 26180

    Problematic issues of using the toolkit of economic cybernetics by V. Persianov, A. Kurbatova

    Published 2019-09-01
    “…Agreeing, that setting limits to the possibilities of computer modeling in advance is impossible, it must be recognized, that the machines created by cybernetics, remain only an objectification – a “truncated” (incomplete) form of any kind of human activity, including management (purposing, selection of criteria, decision-making, etc.).The goal setting requires at least a normal human intelligence. …”
    Get full text
    Article