Showing 681 - 700 results of 28,739 for search '"computing"', query time: 0.09s Refine Results
  1. 681
  2. 682
  3. 683
  4. 684

    Folate Receptor–Targeted Single-Photon Emission Computed Tomography/Computed Tomography to Detect Activated Macrophages in Atherosclerosis: Can It Distinguish Vulnerable from Stable Atherosclerotic Plaques? by Leah C.J. Winkel, Harald C. Groen, Bibi S. van Thiel, Cristina Müller, Antonius F.W. van der Steen, Jolanda J. Wentzel, Marion de Jong, Kim Van der Heiden

    Published 2014-01-01
    “…We investigated the feasibility of a folate-based radiopharmaceutical ( 111 In-EC0800) with high-resolution animal single-photon emission computed tomography/computed tomography (SPECT/CT) to differentiate between stable and vulnerable atherosclerotic plaques in apolipoprotein E 7 mice in which we can induce plaques with the characteristics of stable and vulnerable plaques by placing a flow-modifying cast around the common carotid artery. …”
    Get full text
    Article
  5. 685
  6. 686
  7. 687
  8. 688
  9. 689

    Research progress of sensor-cloud security by Tian WANG, Yang LI, Weijia JIA, Guojun WANG, Shaoliang PENG

    Published 2018-03-01
    Subjects: “…cloud computing…”
    Get full text
    Article
  10. 690
  11. 691
  12. 692
  13. 693

    A Survey of Data Mining Implementation in Smart City Applications by Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Zryan Najat Rashid, Azar Abid Salih, Wafaa M. Abdullah

    Published 2021-04-01
    Subjects: “…Data Computing, Internet of Things, Data Mining, Smart City, Cloud Computing.…”
    Get full text
    Article
  14. 694
  15. 695

    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection by Rafał Kozik, Marek Pawlicki, Michał Choraś, Witold Pedrycz

    Published 2019-01-01
    “…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. …”
    Get full text
    Article
  16. 696
  17. 697

    Real-Time Evaluation of Breast Self-Examination Using Computer Vision by Eman Mohammadi, Elmer P. Dadios, Laurence A. Gan Lim, Melvin K. Cabatuan, Raouf N. G. Naguib, Jose Maria C. Avila, Andreas Oikonomou

    Published 2014-01-01
    “…The general objective of this paper is to design and develop a computer vision algorithm to evaluate the BSE performance in real-time. …”
    Get full text
    Article
  18. 698

    The Assessment of Spinal Alignment Based on a Computer-Assisted Electromechanical Device by Israa Khalifa, Aseel Ghazwan, Luay Asaad Mahmood

    Published 2024-12-01
    “…Subsequently, the data was transmitted to a computer over a Bluetooth module connection, following processing by the Arduino Nano microcontroller. …”
    Get full text
    Article
  19. 699

    Post-processing methods for delay embedding and feature scaling of reservoir computers by Jonnel Jaurigue, Joshua Robertson, Antonio Hurtado, Lina Jaurigue, Kathy Lüdge

    Published 2025-01-01
    “…Abstract Reservoir computing is a machine learning method that is well-suited for complex time series prediction tasks. …”
    Get full text
    Article
  20. 700