Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
25981
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
25982
Extraction and Characterization of Natural Coagulant Made from Banana Plant Stems (Musa acuminate) for the Removal of Turbidity from Wastewater
Published 2023-01-01“…After extraction, the coagulation efficiency of each produced coagulant was computed in terms of their turbidity removal efficiency (%) from sampled wastewater. …”
Get full text
Article -
25983
Diagnostic methods employing kidney biomarkers clinching biosensors as promising tools
Published 2024-01-01“…Existing diagnostic techniques used for monitoring kidney biomarker concentration include chromatographic assays, spectroscopic assays, immunoassays, magnetic resonance imaging (MRI), computed tomography (CT), etc. They also necessitate equipped laboratory infrastructure, specific instruments, highly trained personnel working on these instruments, and monitoring kidney patients. …”
Get full text
Article -
25984
Applied Comparison of Meta-analysis Techniques
Published 2013-02-01“…Proper meta-analysis includes five basic steps: identify relevant studies; extract summary data from each paper; compute study effect sizes, perform statistical analysis; and interpret and report the results. …”
Get full text
Article -
25985
FDK-Type Algorithms with No Backprojection Weight for Circular and Helical Scan CT
Published 2012-01-01“…s algorithm in terms of computational complexity.…”
Get full text
Article -
25986
Colonic Wall Thickening Reported in Abdominal CT: Does It Always Imply Malignancy?
Published 2019-01-01“…In this study, we aimed to examine the effect of the age, hemoglobin (Hb), albumin, neutrophil lymphocyte ratio (NLR), thrombocyte lymphocyte ratio (PLR), and mean platelet values (MPV) on the separation of benign and malignant diseases in patients with suspected colon wall thickness (CWT) observed in abdominal computed tomography (CT) examination. Method. The study included 116 patients between the ages of 18 and 95 who had CT examination where the colon wall could be evaluated and who also had colonoscopy. …”
Get full text
Article -
25987
Variable domain mutational analysis to probe the molecular mechanisms of high viscosity of an IgG1 antibody
Published 2024-12-01“…Here, we combined X-ray crystallography with computational modeling to predict regions of an anti-glucagon receptor (GCGR) IgG1 antibody prone to self-interaction. …”
Get full text
Article -
25988
Considerations for ethics review of big data health research: A scoping review.
Published 2018-01-01“…The methodological novelty and computational complexity of big data health research raises novel challenges for ethics review. …”
Get full text
Article -
25989
Hyperandrogenism, Elevated 17-Hydroxyprogesterone and Its Urinary Metabolites in a Young Woman with Ovarian Steroid Cell Tumor, Not Otherwise Specified: Case Report and Review of t...
Published 2019-01-01“…Transvaginal ultrasound and [18F]− fluorodeoxyglucose positron emission tomography–computed tomography (FDG PET–CT) enabled the localization of a right ovarian tumor. …”
Get full text
Article -
25990
In Silico Study of Coumarins: Wedelolactone as a Potential Inhibitor of the Spike Protein of the SARS-CoV-2 Variants
Published 2023-01-01“…Herein, the inhibition potential of several naturally occurring coumarins was investigated against the spike proteins of SARS-CoV-2 variants using computational approaches. Molecular docking studies revealed 26 coumarins with better binding energies than the reference ligands, molnupiravir and ceftazidime, against the S-RBD of the omicron variant. …”
Get full text
Article -
25991
Clustering by Hybrid K-Means-Based Rider Sunflower Optimization Algorithm for Medical Data
Published 2022-01-01“…This hybrid algorithm can get the advantages of both K-means and RSFO technique and avoid premature convergence of K-means algorithm and high computation cost of optimization technique. K-Means clustering algorithm is used to cluster the medical data by using an optimum centroid. …”
Get full text
Article -
25992
Removal of an Aural Foreign Body by Magnetism
Published 2025-01-01“…Case Presentation: A male patient in his thirties with a history of polysubstance use presented to the emergency department (ED) due to an abrasion on his left forehead caused by banging his head against a wall in self-injurious behavior. A non-contrast computed tomography of the head obtained to rule out intracranial injury incidentally demonstrated a radiodense foreign body in the left external ear canal. …”
Get full text
Article -
25993
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
Get full text
Article -
25994
River water quality monitoring using machine learning with multiple possible in-situ scenarios
Published 2025-06-01“…The study looks into the possibility of estimating WQI solely using dissolved oxygen (DO) and pH as predictors because the chemical parameters in the current Malaysian WQI calculation method takes some time to compute. This research provides insight into the accuracy, precision, and general performance of these models in predicting water quality by looking at the residuals of various scenarios and evaluating performance metrics across different machine learning models. …”
Get full text
Article -
25995
Uncertainty Quantification and Sensitivity Analysis of Concrete Structure Using Multi-Linear Regression Technique
Published 2025-01-01“…However, it is necessary to take haphazard or random phenomena as crucial considerations when assessing the security of these structures or planning new ones. This paper shows computational analysis for the characterization of the behavior of a concrete gravity dam under seismic loads, which are considered sources of uncertainties. …”
Get full text
Article -
25996
The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems
Published 2022-01-01“…Based on the real-time computing technology of massive data, the label optimization scheme of collaborative filtering and reinforcement learning is used to realize the logistics distribution recommendation model and to solve the accuracy and real-time problems of logistics service distribution analysis.…”
Get full text
Article -
25997
Identification of blood plasma protein ratios for distinguishing Alzheimer's disease from healthy controls using machine learning
Published 2025-02-01“…Proteins in the plasma were quantified using specialized panels designed for proteomic extension assays. Through computational analysis using a linear support vector machine algorithm, we identified 82 differentially expressed proteins between the two groups. …”
Get full text
Article -
25998
Application of Peaks Over Threshold Method in Flood Frequency Analysis in Seyhan Basin
Published 2020-07-01“…Finally, flood quantities with the recurrence intervals of 2, 5, 10, 25, 50, 100, 200, 500 and 1000 years were computed and compared to the corresponding quantities obtained from the annual maximum series. …”
Get full text
Article -
25999
Research of the microwave generator and antenna emitters for hyperthermia of oncological diseases
Published 2022-11-01“…The materials and methods of computational mathematics, ultrahigh frequency technology and the theory of automatic regulation are used in the study. …”
Get full text
Article -
26000
A Rare Cause of Pain in a Patient Following Roux-en-Y Choledochojejunostomy
Published 2024-01-01“…The work up revealed mild leukocytosis and computed tomography (CT) imaging that showed dilation of the distal CBD remnant. …”
Get full text
Article