Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 2
- Molecular biology 2
- Anesthesia 1
- Critical Care 1
- Evaluation research (Social action programs) 1
- Evidence-based social work 1
- Grammar, Comparative and general 1
- Internet marketing 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Mathematical Concepts 1
- Physical Phenomena 1
- Research 1
- Social service 1
- Syntax 1
-
421
Structure of Patients with Hepatocellular Cancer (Data Analysis from Two Specialised Centres)
Published 2020-05-01Get full text
Article -
422
THE NEOTECTONIC STRUCTURE OF INTERMOUNTAIN BASINS OF MOUNTAINOUS ALTAI ACCORDING TO ELECTROMAGNETIC AND GEOLOGICAL DATA
Published 2015-09-01“…The article presents new data on the geoelectrical structure of Chuya, Kuray and Uymon intermountain basins, which are the three largest ones in Mountainous Altai, Russia. …”
Get full text
Article -
423
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
424
MRS-BIDS, an extension to the Brain Imaging Data Structure for magnetic resonance spectroscopy
Published 2025-08-01“…The Brain Imaging Data Structure (BIDS) is an increasingly adopted standard for organizing scientific data and metadata. …”
Get full text
Article -
425
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
Published 2020-12-01“…Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. …”
Get full text
Article -
426
Fast and accurate short-read alignment with hybrid hash-tree data structure
Published 2024-10-01Get full text
Article -
427
A CDE-based data structure for radiotherapeutic decision-making in breast cancer
Published 2025-07-01“…Abstract Background The growing complexity of oncology and radiation therapy demands structured and precise data management strategies. The National Institutes of Health (NIH) have introduced Common Data Elements (CDEs) as a uniform approach to facilitate consistent data collection. …”
Get full text
Article -
428
Determination of Spatial-Temporal Correlation Structure of Troposphere Ozone Data in Tehran City
Published 2013-06-01“…For eliminating the trend of data, a dynamic linear model is used, then some features of correlation structure of de-trended data, such as stationarity, symmetry and separability are considered. …”
Get full text
Article -
429
Research on Smart Scaling Mechanism and Structure for Big Data Network Server Groups
Published 2015-03-01“…The principle and construction of the structure of smart telescopic on big data network server groups were elaborated.The key technologies involved in the smart scaling of big data network server groups were discussed.After investigating key technologies,including the monitoring of the workload of the server group,the smart control of the number of servers,and the scheduling of access loads,the principle and realization method for the smart scaling of big data network server groups were proposed and technical supports were provided for the smart scaling and effective energy conservation of big data network server groups.According to the proposed construction method and key technologies,a smart scaling model for big data network server groups was provided as well.…”
Get full text
Article -
430
New data on the geological structure and zonality of the Vorontsovka gold field in the Northern Urals
Published 2023-12-01Get full text
Article -
431
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
432
Assessing the harmonization of structured electronic health record data to reference terminologies and data completeness through data provenance
Published 2025-04-01“…Abstract Introduction (1) Assess the harmonization of structured electronic health record data (laboratory results and medications) to reference terminologies and characterize the severity of issues. (2) Identify issues of data completeness by comparing complementary data domains, stratifying by time, care setting, and provenance. …”
Get full text
Article -
433
SemantiPack: An Efficient Real-World Data Compressor Using Structural and Semantic Metadata
Published 2025-01-01“…The exponential growth of Real-World Data (RWD), primarily collected from IoT sensors and spanning domains such as mobility, environment, and energy consumption, presents critical challenges due to its scale, heterogeneity, and structural variability. …”
Get full text
Article -
434
GEODYNAMIC ACTIVITY OF MODERN STRUCTURES AND TECTONIC STRESS FIELDS IN NORTHEAST ASIA
Published 2017-12-01Subjects: “…parageneses of active structures…”
Get full text
Article -
435
Analysis of retirees' knowledge return in the supply chain of Isfahan Refinery with a combined approach of interpretive structural modeling and structural equation modeling
Published 2025-03-01“…In order to confirm or reject the conceptual model, the structural equation modeling approach and Smart PLS3 software were used. …”
Get full text
Article -
436
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. …”
Get full text
Article -
437
SMART: Structured Missingness Analysis and Reconstruction Technique for credit scoring
Published 2025-04-01“…Building on these developments, this study proposes a novel imputation approach, SMART (Structured Missingness Analysis and Reconstruction Technique) for credit scoring datasets. …”
Get full text
Article -
438
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. …”
Get full text
Article -
439
Dynamics of link formation in networks structured on the basis of predictive terms
Published 2023-06-01“…In order to model and analyze the information conductivity of complex networks having an irregular structure, it is possible to use percolation theory methods known in solid-state physics to quantify how close the given network is to a percolation transition, and thus to form a prediction model. …”
Get full text
Article -
440
Initial Phase and Modulation Factor Optimization for Structured Illumination Microscopy
Published 2017-01-01“…Structured illumination microscopy (SIM) is a widefield super-resolution technique in fluorescent imaging. …”
Get full text
Article