Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
26141
Predicting survival in malignant glioma using artificial intelligence
Published 2025-01-01“…Limitations include data heterogeneity, interpretability challenges and computational demands, particularly in resource-limited settings. …”
Get full text
Article -
26142
A simulation study of thermal and hydraulic characteristics mini-channel circular heat sink: Effect of L-shaped multi-channel arrangement on flow maldistribution
Published 2025-01-01“…In this investigation, six distinct circular mini channel heat sinks were subjected to testing. Computational simulations were employed to assess their efficacy. …”
Get full text
Article -
26143
A first attempt to model global hydrology at hyper-resolution
Published 2025-01-01“…We highlight that global hyper-resolution modeling is possible with current computational resources and that hyper-resolution modeling results in more realistic representations of the hydrological cycle. …”
Get full text
Article -
26144
RETRACTED: Intelligent power grid energy supply forecasting and economic operation management using the snake optimizer algorithm with Bigur-attention model
Published 2023-09-01“…The model evaluation phase calculates metrics such as prediction error, accuracy, and stability, and also examines the model’s training time, inference time, number of parameters, and computational complexity to assess its efficiency and scalability. …”
Get full text
Article -
26145
Autologous Dermis Graft Implantation: A Novel Approach to Reinforcement in Giant Hiatal Hernias
Published 2018-01-01“…One-month follow-up showed normal anatomical location of abdominal viscera on computed tomography imaging. High-resolution manometry showed normal lower esophageal sphincter pressure. …”
Get full text
Article -
26146
Medicine Dose Adjustment Practice and Associated Factors among Renally Impaired Patients in Amhara Regional State, Ethiopia
Published 2021-01-01“…Descriptive statistics such as frequencies and percentages were computed. Both bivariable and multivariable binary logistic regression analyses were fitted to identify factors associated with dose adjustment practice. …”
Get full text
Article -
26147
The spatio-temporal trend of climate and characterization of drought in Borana Zone, Ethiopia
Published 2025-02-01“…The standard Precipitation and Evaporation index (SPEI) and self calibrated Palmer’s Droguht Severity Index (scPDSI) were selected to compute the drought’s magnitude. Precipitation significantly decreased from 1991 to 2020, with a variation from 2021 to 2050. …”
Get full text
Article -
26148
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
Get full text
Article -
26149
Adaptive Multi-Sensor Fusion for SLAM: A Scan Context-Driven Approach
Published 2025-01-01“…Experimental results on multiple public benchmark datasets demonstrate that in the case of almost the same computational efficiency, the proposed algorithm effectively enhances the accuracy of positioning, the robustness of the algorithm and accuracy of mapping, improving the global consistency of the generated map.…”
Get full text
Article -
26150
Technology of estimating nitrogen dioxide and carbon dioxide emissions by large industrial centers of Western Siberia
Published 2024-06-01“…The NO2 content in the region’s troposphere was determined using data from the TROPOMI spectroradiometer of the Sentinel-5 Precursor satellite. The method of computational experiments to obtain quantitative estimates of CO2 emissions from large industrial facilities in the region consists in a joint analysis of data from TROPOMI/Sentinel-5P for the NO2 content and data from the OCO-2 orbiting carbon observatory for the CO2 content. …”
Get full text
Article -
26151
Primary Appendiceal Adenocarcinoma Presenting with Hematochezia due to the Invading Tumor in the Sigmoid Colon
Published 2020-01-01“…Colonoscopy revealed a tumor in the sigmoid colon, which was a well-differentiated tubular adenocarcinoma. A computed tomography scan showed an appendiceal mass that involved the sigmoid colon, suggesting an appendiceal cancer invading the sigmoid colon. …”
Get full text
Article -
26152
Experimental and numerical studies on thermal behavior and performance assessment of Al2O3/H2O nanofluids in microchannels for cooling solutions
Published 2025-01-01“…Theoretically, the computational fluid dynamics (CFD) simulations are performed using the three-dimensional (3D) single-phase and mixture models to determine the velocity, temperature and nanoparticle concentration distributions. …”
Get full text
Article -
26153
Diagnosis and Treatment of Symptomatic Multiple Sacral Perineural Cysts-Technical Note
Published 2025-01-01“…Technical Note: Six patients with multiple sacral cysts, identified using magnetic resonance imaging (MRI), were further examined using myelography and computed tomography (CT) immediately and 6-18 h after myelography. …”
Get full text
Article -
26154
Tennis Assistance Technology Based on Dynamic Time Warping Algorithm
Published 2025-01-01“…This technology combines components such as normalization, support vector machine, joint detection, sparse matrix, and second-order stepping mode to improve algorithm performance and reduce computational complexity. The experiment outcomes indicate that this method can validly raise the training effect of tennis players, with an accuracy rate of 95.66%, a calculation time of 0.32 seconds, a variance of 0.88, and an average absolute error of 4.22. …”
Get full text
Article -
26155
Persistent Visual Aura following Catheter Ablation in a Patient with WPW Syndrome
Published 2007-01-01“…Magnetic resonance imaging (MRI) and single photon emission computed tomography (SPECT), electroenchepalogram (EEG), and visual-evoked potentials (VEP) in the patient were normal. …”
Get full text
Article -
26156
Community pharmacist-and psychologist-led program of neuropsychological screening in the aftermath of the COVID-19 pandemic: A cross-sectional survey
Published 2023-06-01“…The accuracy, sensitivity, and specificity of the classical medical/psychological referral for cognitive impairment were computed. Results: A sample of 185 subjects (aged 61.24±15.06 years, 78.9% females) was recruited. …”
Get full text
Article -
26157
Improving Neutral Density Predictions Using Exospheric Temperatures Calculated on a Geodesic, Polyhedral Grid
Published 2020-01-01“…For convenience the new model is referred to with the acronym EXTEMPLAR (EXospheric TEMperatures on a PoLyhedrAl gRid). Neutral densities computed from the EXTEMPLAR‐NRLMSISE‐00 models combined are found to produce very good results when compared with measured values.…”
Get full text
Article -
26158
Forecasting power generation of wind turbine with real-time data using machine learning algorithms
Published 2024-12-01“…The findings indicated XGBoost algorithm outperformed the other models, achieving high accuracy while demonstrating computational efficiency, making it particularly suitable for real-time applications in energy forecasting.…”
Get full text
Article -
26159
Emerging of Fatal Colitis with Multidrug-Resistant Candida glabrata after Small Bowel Transplantation
Published 2021-01-01“…Ileoscopy and colonoscopy did not show neither pathological change and rejection nor cytomegalovirus (CMV) infection posttransplantation. Abdomen computed tomography showed diffuse moderate small bowel wall thickening. …”
Get full text
Article -
26160
Morphometric Assessment of the Piriform Aperture and Its Clinical and Forensic Applications
Published 2024-12-01“…Materials and Methods: The PA’s dimensions were retrospectively examined using 336 (199 males and 137 females) adult cranial computed tomography images in the database of the radiology unit of a university teaching hospital in Delta State, Nigeria, following institutional authorization. …”
Get full text
Article