Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
24761
Extracting entity-based information in cyber-physical systems
Published 2017-04-01“…Besides, utilizing the idea of sharing computations, by extending previous automaton techniques, an efficient implementation of P 3 E is provided. …”
Get full text
Article -
24762
Corticosteroids and Azathioprine Do Not Prevent Radiation-Induced Lung Injury
Published 1998-01-01“…Chest x-ray showed bilateral pulmonary infiltrates. Computed tomography scan of the thorax confirmed bilateral ground glass opacities, with well-defined lateral margin on the right side corresponding to the field of radiation. …”
Get full text
Article -
24763
A case of large uterine cystic adenomyosis outside the uterus after laparoscopic myomectomy: a case report and literature review
Published 2025-01-01“…She returned to our hospital due to excessive menstruation and intermittent right lower abdominal pain for one year. Pelvic computed tomography revealed an endometriotic cyst on the right posterior side of the uterus seemingly connected to the uterine cavity. …”
Get full text
Article -
24764
Inclined magnetic fields heat transfer and thermal radiation on fractionalized EMHD Burgers’ fluid flow via bifurcated artery for tumor treatments
Published 2025-03-01“…Analytical solutions of the transformed equations were computed using a combined Laplace transform and the classical method of undetermined coefficients. …”
Get full text
Article -
24765
APMAT analysis reveals the association between CD8 T cell receptors, cognate antigen, and T cell phenotype and persistence
Published 2025-02-01“…Here, we describe Antigen-TCR Pairing and Multiomic Analysis of T-cells (APMAT), an integrated experimental-computational framework designed for the high-throughput capture and analysis of CD8 T cells, with paired antigen, TCR sequence, and single-cell transcriptome. …”
Get full text
Article -
24766
Delayed Awareness of the History of Barium Examination: Perforated Barium Appendicitis
Published 2017-01-01“…Abdominal X-ray examination showed a radiopaque object in the right lower quadrant of the abdomen. Abdominal computed tomography (CT) demonstrated that the object had a strong artifact with over 10,000 Hounsfield units, as well as ascites around the terminal ileum. …”
Get full text
Article -
24767
Preorder of Factors Affecting Oil Prices: Fuzzy PROMETHEE Approach
Published 2022-01-01“…A group of four experts are invited to provide an evaluation on scales of 1 to 5 of the importance of factors with respect to criteria. In computation, the evaluations are treated as triangular fuzzy numbers in which the uncertainty in data is dealt with amicably. …”
Get full text
Article -
24768
Application of deep residual networks to predict the effective properties of fiber-reinforced composites with voids
Published 2025-01-01“…Also, it is noted that, the proposed model has a good performance to predict mechanical properties with lesser computational cost.…”
Get full text
Article -
24769
Numerical Simulation of Parameters Optimization for Goaf Gas Boreholes
Published 2019-01-01“…In view of the ground drilling of the N2206 working face in Shanxi Wangzhuang Coal Mine, the gas concentration is low and the extraction effect is not good. Fluent computational fluid dynamics software was used to simulate the ground extraction drilling position of the N2206 working face in the goaf (the distance from the top of the coal seam and the distance from the return to the wind). …”
Get full text
Article -
24770
Dynamic Simulation on Deflagration of LNG Spill
Published 2019-01-01“…The deflagration characteristics of premixed LNG vapour-air mixtures with different mixing ratios were quantitatively and qualitatively investigated by using CFD (computational fluid dynamics) method. The CFD model was initially established based on theoretical analysis and then validated by a lab-scale deflagration experiment. …”
Get full text
Article -
24771
Primary Pleural Benign Myxoid Schwannoma in an 18-Year-Old Female: A Case Report and Literature Review
Published 2014-01-01“…Physical examination and all laboratory tests were normal. Contrast-enhanced computed tomography scan showed a 4.2×3.2 cm, heterogeneous noncalcified mass involving the right adrenal gland region. …”
Get full text
Article -
24772
An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid
Published 2021-01-01“…This paper studies the distributed economic dispatch problem (EDP) under denial-of-service (DoS) attacks for the microgrid, in which each generator can communicate with its neighbors and has the computational capability to implement local operation. …”
Get full text
Article -
24773
Design of the Engine Timing Silent Chain System Based on the Pitch-variation Algorithm
Published 2024-12-01“…Based on a timing silent chain system in two-axle type engines, the mathematical model of the correct ideal chain path was established, and an algorithm for automatically computing the radius of the loose side or tension side chain and its corresponding wrap angle was presented. …”
Get full text
Article -
24774
Universal slip detection of robotic hand with tactile sensing
Published 2025-02-01“…By combining frequency with time domain features, the network achieves a computation time of only 1.26 ms and an average accuracy of over 97% on both the validation and test datasets, demonstrating strong generalization capabilities. …”
Get full text
Article -
24775
Optimal Control and Cost-Effectiveness Strategies of Malaria Transmission with Impact of Climate Variability
Published 2022-01-01“…The next-generation matrix method is used to compute a basic reproduction number with respect to the disease-free equilibrium point. …”
Get full text
Article -
24776
The nonlinear cysteine redox dynamics in the i-space: A proteoform-centric theory of redox regulation
Published 2025-04-01“…The i-space encapsulates the theoretical landscape of all possible cysteine proteoforms. Using computational approaches, we quantify the vast size of the abstract i-space, revealing its scale-free architecture—elucidating the disproportionate influence of cysteine-rich proteins. …”
Get full text
Article -
24777
Adaptive Numerical Method for Approximation of Traffic Flow Equations
Published 2022-01-01“…The technique is described in detail, and a number of computational examples are presented.…”
Get full text
Article -
24778
Difference equations: From Berry connections to the Coulomb branch
Published 2025-02-01“…The effective IR description of the 2d theory in terms of a twisted superpotential allows for explicit computations of these actions, which we demonstrate for Abelian GLSMs.…”
Get full text
Article -
24779
X-Ray CT Investigation on Fractal Characteristics of Fine-Grained Tailing Sand in Fujian’s Makeng: Insight into the Mesoscopic Seepage Failure
Published 2021-01-01“…The macroscopic seepage tests combined with posttest X-ray computed tomography (CT) were employed to study the fractal characteristics of mesostructure. …”
Get full text
Article -
24780
Rapid analysis of temperature fields in electronic enclosures based on the finite difference thermal resistance network method
Published 2025-01-01“…With the accelerated pace of functional updates and iteration in electronic enclosures design, the thermal design cycle is continuously shortened. However, the computational process of numerical simulation methods based on the finite element method (FEM) and finite volume method (FVM) is time-consuming, which limits the speed of product development. …”
Get full text
Article