Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
18361
Modified Two-Stage Exchange for Periprosthetic Joint Infection in UKA
Published 2020-01-01“…This report presents a novel surgical technique of resection arthroplasty with an articulated hemispacer as part of a 2-stage exchange protocol. …”
Get full text
Article -
18362
Design and Analysis of Yoshimura Tubular Origami Mechanisms
Published 2024-12-01“…Drawing inspiration from the biological concept of “morphological variation,” we propose a novel tubular origami mechanism based on the Yoshimura pattern, which is the main contribution of this research. …”
Get full text
Article -
18363
One-dimensional bio-thermo-mechanical impacts induced by laser pulse in a layer skin tissue by means of MGL model
Published 2024-12-01“…The goal of this paper is to construct a novel model based on the recently modified Green and Lindsay model to study the bio-thermo-mechanical responses induced by uniform laser radiation in a thermoelastic biological skin tissue. …”
Get full text
Article -
18364
Bayesian Models Are More Sensitive than Frequentist Models in Identifying Differences in Small Datasets Comprising Phonetic Data
Published 2024-12-01“…While many studies have previously conducted direct comparisons between results obtained from frequentist and Bayesian models, our research introduces a novel perspective by examining these models in the context of a small dataset comprising phonetic data. …”
Get full text
Article -
18365
Heart-retina time analysis using electrocardiogram-coupled time-resolved dynamic optical coherence tomography
Published 2025-01-01“…The HRT could provide a novel potential biomarker for cardiovascular health in direct relation to retinal perfusion.…”
Get full text
Article -
18366
The effect of chimney entrance slope and constricted section on the performance of solar chimney power plants: A CFD approach
Published 2025-01-01“…A computational fluid dynamics model (CFD) is constructed based on Manzanares plant with a chimney height (H) of 194.6 m via ANSYS FLUENT. The novel configurations are generated by changing the chimney inlet slope, θ (45°-85°) and radius of the constricted section with a fixed height (H/28). …”
Get full text
Article -
18367
Enhancing Facial Identification Systems with YOLOv8: A Cutting-Edge Approach
Published 2024-09-01“…As a result, this paper presents a sophisticated system for face identification adopting a novel algorithm of deep learning, namely, You Only Look Once version 8 (YOLOv8). …”
Get full text
Article -
18368
Unified Design Methodology for a Polycentric Transfemoral Knee Prosthesis Using Kinematic Synthesis
Published 2024-12-01“…This study introduces a novel single-degree-of-freedom polycentric knee mechanism specifically designed for transfemoral prostheses to address dual challenges of stability during the stance phase and biomimetic motion during the swing phase. …”
Get full text
Article -
18369
Dynamic Graph Attention Network with Sentiment Analysis for Fake News Detection in Social Networks
Published 2024-09-01“…In this study, we propose a novel approach, the Dynamic Graph Attention Network (DynGAT), for effective fake news detection. …”
Get full text
Article -
18370
Optimizing Security and Cost Efficiency in N-Level Cascaded Chaotic-Based Secure Communication System
Published 2024-10-01“…This paper addresses this gap by introducing a novel N-level cascaded chaotic-based secure communication system for voice encryption, leveraging the four-dimensional unified hyperchaotic system. …”
Get full text
Article -
18371
Titanium/FRP hybrid sandwich: in-plane flexural behaviour of short beam specimens
Published 2024-07-01“…Adopting novel sandwich structures with FRP (Fibre Reinforced Polymer) skins and a metallic lattice core, both of which have high specific strength and stiffness, is one way to achieve better mechanical performance while remaining lightweight. …”
Get full text
Article -
18372
An online frequency allocation strategy for multi‐carrier radar against spot jammer
Published 2024-11-01“…Abstract Spot jamming poses a significant threat to radar detection due to its ability to rapidly intercept radar signals and emit high‐power interference. A novel Cognitive Multi‐Carrier Radar (CMCR) is proposed, which utilises a detection waveform comprising multiple narrow bands to reduce the disruption from the spot jammer. …”
Get full text
Article -
18373
A Rapid Prototyping Environment for Cooperative Advanced Driver Assistance Systems
Published 2018-01-01“…Since the complexity of such cooperative ADAS grows with each vehicle involved, very large parameter spaces need to be regarded during their development, which necessitate novel development approaches. In this paper, we present an environment for rapidly prototyping cooperative ADAS based on vehicle simulation. …”
Get full text
Article -
18374
Photodynamic anti-inflammatory activity of meso‑aryl substituted porphyrin derivative on mammalian macrophages
Published 2024-02-01“…Conclusion: Our future studies will focus on the generation and in vitro as well as in vivo characterization of the porphyrin derivatives with anti-inflammatory photodynamic therapy applications. In this way, novel drug candidates that would have lower side effects can be generated for the patients.…”
Get full text
Article -
18375
Metaheuristics and Large Language Models Join Forces: Toward an Integrated Optimization Approach
Published 2025-01-01“…This paper introduces a novel approach that leverages LLMs as pattern recognition tools to improve MHs. …”
Get full text
Article -
18376
Optimal sizing of battery energy storage system (BESS) for multiple applications using regression analysis and deep sleep optimizer algorithm
Published 2024-12-01“…In order to deploy BESS for multiple applications, it is of utmost importance that the optimal size for the desired multiple functions, firstly be determined. This work proposes a novel methodology for the optimal sizing of battery energy storage system for frequency support, power loss minimization and voltage deviation mitigations. …”
Get full text
Article -
18377
Orbital angular momentum beamforming techniques for indoor multiuser optical wireless communications
Published 2024-12-01“…In this paper, we propose a novel OAM beamforming technique for an indoor multiuser OWC network using weighted impulse response, based on the sum of intensity contributions of superposed multiple OAM states carrying Laguerre-Gaussian (LG) ultraviolet (UV) beams. …”
Get full text
Article -
18378
Estimating the Burden of Cost in Chronic Graft-versus-Host Disease: A Human Capital Approach
Published 2016-06-01“…Our choice of a ten-year time horizon is novel to the field of rare disease and was determined to be meaningful after consultations with present co-authors, including five physicians, one of whom is a transplant surgeon. …”
Get full text
Article -
18379
Detection of sensors used for adversarial examples against machine learning models
Published 2024-12-01“…This study introduces a novel detection method using a feature-removable model (FRM), which allows the selective removal of features to identify inconsistencies in the model's outputs when different sensor features are altered. …”
Get full text
Article -
18380
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01“…Model extraction attack focuses on reverse engineering architecture and weights of DNN model deployed in edge.Model extraction attack is a basic security problem in AI security, it underlies advanced attacks as data provider, such as adversarial sample and data poisoning.A novel method named Cluster-based SCA was proposed,this method did not need leakage model.Cluster-based SCA was based on vulnerability of quantized inference.There exist a phenomenon in multiplication operation in quantized inference, which the output of different weights were not equivalent in respect of classification.It can be used to distinguish different weights.The proposed method computed output activations of each DNN layer with guessing weight.Then acquired side channel signal were classified into different class, the taxonomy was corresponding output activations' value.Average dispersion of all classes <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mover accent="true"> <mi>σ</mi> <mo>¯</mo> </mover> </math></inline-formula> was used to decide whether guess was right.The effectiveness of Cluster-based SCA method was verified by simulation experiment and HW model was used as target leakage model.For all weights from first convolution layer of target CNN model, TOP2 recovery rate was 52.66%.And for large weights in significant interval,TOP2 recover rate was 100%.…”
Get full text
Article