Showing 25,241 - 25,260 results of 28,739 for search '"computer"', query time: 0.10s Refine Results
  1. 25241

    Emotion Monitoring for Preschool Children Based on Face Recognition and Emotion Recognition Algorithms by Guiping Yu

    Published 2021-01-01
    “…Using the deep learning approach, we design a more lightweight network structure to reduce the number of parameters and save computational resources. There are not only innovations in applications, but also algorithmic enhancements. …”
    Get full text
    Article
  2. 25242

    Experimental Investigation of Brazilian 14-X B Hypersonic Scramjet Aerospace Vehicle by João Felipe de Araujo Martos, Israel da Silveira Rêgo, Sergio Nicholas Pachon Laiton, Bruno Coelho Lima, Felipe Jean Costa, Paulo Gilberto de Paula Toro

    Published 2017-01-01
    “…Experimental data was compared to the analytical theoretical solutions and the computational fluid dynamics (CFD) simulations, showing good qualitative agreement and in consequence demonstrating the importance of these methods in the project of the 14-X B hypersonic scramjet aerospace vehicle.…”
    Get full text
    Article
  3. 25243

    Distribution Characteristics of Swirling-Straight Sprinklers Inside a Nuclear Power Pressurizer by Jinghao Bi, Xiao Xu

    Published 2025-01-01
    “…The findings contribute to the optimization of spray performance and provide valuable data for computational fluid dynamics model verification.…”
    Get full text
    Article
  4. 25244

    Invasive Aspergillosis in a Patient with Stage III (or 3a or 3b) Non-Small-Cell Lung Cancer Treated with Durvalumab by Ashish Gupta, Aung Tun, Katy Ticona, Aam Baqui, Elizabeth Guevara

    Published 2019-01-01
    “…He had completed six cycles of chemotherapy with paclitaxel and carboplatin and four cycles of immunotherapy with durvalumab 13 days before his emergency hospital admission. Computed tomography (CT) imaging showed a large left-sided loculated hydropneumothorax suggestive of empyema, patchy opacification of the left lung, and a left upper lobe lung mass. …”
    Get full text
    Article
  5. 25245

    Brachialis Muscle Rupture in a Pediatric Patient Followed Up by Ultrasound Examinations: A Rare Case Report by Akihiro Yamaji, Masafumi Uesugi, Hiroshi Kamada, Harumitsu Ichimura, Masashi Yamazaki

    Published 2022-01-01
    “…There were no clear signs of deformities or swelling in the left elbow and no obvious tenderness. X-ray and computed tomography (CT) imaging examinations revealed no signs of a fracture or dislocation, and the patient was diagnosed with left brachialis muscle rupture based on magnetic resonance imaging (MRI). …”
    Get full text
    Article
  6. 25246

    A case of kidney graft injury during cesarean section in a pancreas and kidney transplantation recipient by Noriko Aida, Eiji Nishio, Takao Sekiya, Naohiro Aida, Taihei Ito, Takashi Kenmochi, Haruki Nishizawa

    Published 2025-02-01
    “…As this elevation was considered to be due to kidney graft dysfunction, we performed computed tomography, which revealed a hematoma around the kidney graft. …”
    Get full text
    Article
  7. 25247

    Optimized coverage algorithm of wireless video sensor network based on quantum genetic algorithm by Fu-you FAN, Guo-wu YANG, Qian-qi LE, Feng-mao LV, Chao ZHAO

    Published 2015-06-01
    “…According to the construction needs of the smart city wireless video sensor network,an optimized network coverage algorithm based on quantum genetic algorithm is proposed.The algorithm fits in with complicated monitoring scene which has some different obstacles and different degree of importance.The monitoring region is depicted by two-dimensional discrete grid model,and the discrete grid model is represented by a code description matrix.The directional wireless video sensor is described by a seven-tuples.The mathematical programming model of the coverage problem is obtained by strict mathematical derivation.The optimized coverage algorithm is comprised by IntialDeployment and OptimizedDeployment algorithms,which takes the maximum coverage rate network deployment scheme as the solving goal.The quantum genetic algorithm with reasonable chromosome coding and optimized quantum rotation gate parameter is used to search the solution space,which has a good convergence rate and a fast computation speed.Two limit values of ideal coverage rate and ideal weighted coverage rate are introduced to evaluate the algorithm by the way of relative comparison.The result of simulation experiments and data analyses show that the solutions worked out by the algorithm can well approximate the ideal limit value.When the number of sensor nodes is given,the algorithm can obtain the maximum effective coverage rate.…”
    Get full text
    Article
  8. 25248

    A comprehensive characterization biotransformation of chlorinated paraffin by human and carp liver microsomes via liquid chromatography-high-resolution mass spectrometry and screen... by Liujun Chen, Caiming Tang, Zhiqiang Yu, Yanhong Zeng, Bixian Mai, Xiaojun Luo

    Published 2025-01-01
    “…This study also highlighted potential toxicity concerns, with computational predictions showing varying degrees of acute oral toxicity for CP-4 and its metabolites. …”
    Get full text
    Article
  9. 25249

    Comparison of User-Directed and Automatic Mapping of the Planned Isocenter to Treatment Space for Prostate IGRT by Zijie Xu, Ronald Chen, Andrew Wang, Andrea Kress, Mark Foskey, An Qin, Timothy Cullip, Gregg Tracton, Sha Chang, Joel Tepper, Di Yan, Edward Chaney

    Published 2013-01-01
    “…The average of the unsigned x, y, and z offsets and the standard deviations (σ) of the signed offsets computed over all images were (avg. ±  σ (mm)): 1.1 ± 1.4, 1.8 ± 2.3, 2.5 ± 3.5 for the clinical protocol and 0.6 ± 0.8, 1.1 ± 1.5 and 1.1 ± 1.4 for the automatic method. …”
    Get full text
    Article
  10. 25250

    Acute Lymphoblastic Leukemia Presenting as Pituitary Apoplexy: A Case Report and Review of the Literature by Rahul Gupta, Urmimala Bhattacharjee, K. S. Lekshmon, Shakun Chaudhary, Prashant Sharma, Aditya Jandial, Pinaki Dutta

    Published 2021-01-01
    “…Herein, we report a case of 60-year-old male presenting with acute-onset headache, bilateral vision loss, and ptosis. Computed tomography and magnetic resonance imaging revealed findings indicative of pituitary adenoma with apoplexy. …”
    Get full text
    Article
  11. 25251

    E-Counselling for Learner Support Services in ODL Institutions: A Practical Approach by A. C. Ukwueze

    Published 2016-07-01
    “…Some fundamental challenges facing the use of this innovative platform include power failure, poverty, illiteracy and attitudinal problems towards the use of computers. Ideally, every open education institution should have a robust learner support services unit with adequate facilities necessary for e-counselling in order to engage students in meaningful virtual academic activities. …”
    Get full text
    Article
  12. 25252

    Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks by Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang

    Published 2015-07-01
    “…However, these schemes all need very expensive pairing computation, which is not suitable for sensor networks. …”
    Get full text
    Article
  13. 25253

    Comparative analysis and manufacturing of airfoil structures suitable for use at low speeds by Sinan Fidan, Satılmış Ürgün, Mert Gökdemir

    Published 2022-12-01
    “…With the selected wing profile, the geometry is shaped in two dimensions and designed in three dimensions. Computational fluid dynamics (CFD) was adopted as the method for studying wing profiles. …”
    Get full text
    Article
  14. 25254

    Detection of weeds in vegetables using image classification neural networks and image processing by Huiping Jin, Kang Han, Kang Han, Hongting Xia, Bo Xu, Xiaojun Jin

    Published 2025-01-01
    “…Among these models, the ResNet model exhibited the highest computational efficiency, with a classification time of 12.76 ms per image and a corresponding frame rate of 80.31 fps, satisfying the requirement for real-time weed detection. …”
    Get full text
    Article
  15. 25255
  16. 25256

    Distance Constrained Sparse Representation Approach for Scene Based Nonuniformity Correction in Infrared Imaging by Zhe Liu, Hongtao Deng, Xun Zhu, Longxiang Li

    Published 2024-01-01
    “…This method diverges from conventional neural-network based techniques by eschewing spatial filters for the computation of the desired image. Instead, it harnesses the sparse representation of the estimated irradiance within a hypersphere of adaptive radius, adhering to a distance constraint. …”
    Get full text
    Article
  17. 25257

    CUSE-TD Algorithm for Precision Detection of Coherent and Uncorrelated Signals by Rohini Dakulagi, Ravi Raushan, Soham Dutta, Mohammed Theeb Alosaimi, Miguel Villagomez-Galindo

    Published 2025-01-01
    “…The paper provides an in-depth assessment of the algorithm’s performance, highlighting its computational efficiency and ability to handle diverse sensor-driven scenarios. …”
    Get full text
    Article
  18. 25258

    Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model by Geontae Noh, Ji Young Chun, Ik Rae Jeong

    Published 2014-01-01
    “…Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. …”
    Get full text
    Article
  19. 25259

    Dual-modal super-resolution ultrasound and NIR-II fluorescence imaging of ischemic stroke with ICG-doped porous PLGA microspheres by Ziyue Li, Yu Qiang, Dongli Chen, Dehong Hu, Duyang Gao, Xiaohua Xu, Lei Sun, Yingjia Li, Weibao Qiu, Zonghai Sheng

    Published 2025-04-01
    “…Traditional imaging modalities, such as magnetic resonance imaging and computed tomography, while effective for identifying stroke locations, are often limited in their ability to detect early pathological changes due to constraints in spatial resolution and sensitivity. …”
    Get full text
    Article
  20. 25260

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…Simulation experiments show that this scheme reduces the number of interactions during the access of Internet of things devices, reduces the computing cost of identity authentication stage, and reduces the total cost of signcryption and decryption by more than 7% compared with the existing schemes. …”
    Get full text
    Article