Suggested Topics within your search.
Suggested Topics within your search.
-
261
Forward Computational Modeling of Respiratory Airflow
Published 2024-12-01“…CFD allows for new hypotheses to be tested in silico, and detailed results generated without performing expensive experimental procedures that could be potentially harmful to patients. Such computational techniques are also useful for analyzing structure–function relationships in healthy and diseased lungs, assessing regional ventilation at various time points over the course of clinical treatment, or elucidating the changes in airflow patterns over the life span. …”
Get full text
Article -
262
Impact of computing infrastructure on carbon emissions in China
Published 2024-11-01“…Based on the panel data and business enterprise registration data of 279 prefecture-level cities from 2008 to 2021, using the econometric model system, this study investigates the relationship between computing infrastructure and carbon emission intensity, yielding several findings: First, our result finds that there is an inverse “U-shaped” pattern in the association between carbon emission intensity and computing infrastructure. …”
Get full text
Article -
263
Ghost in the Machine: Daily Interaction with Ephemeral Computing
Published 2025-07-01“…To realise this project of ubiquitous “spatial computing”, technology companies are converging on the development of wearable tools, mostly augmented reality (AR) glasses. …”
Get full text
Article -
264
Considerations of Cloud Computing Contracts at the Conclusion Stage
Published 2025-03-01“…Conclusion The results of this research show that cloud computing contracts, due to the specific characteristics of cloud services and how these services are provided, follow a different pattern compared to traditional contracts. …”
Get full text
Article -
265
-
266
An Array of Patterns in the Diagnosis of Oral Pathosis
Published 2025-01-01“…Though these patterns can often overlap they are still helpful in the diagnosis. …”
Get full text
Article -
267
Study on Pattern Matching in Network Security
Published 2015-03-01“…Pattern matching is the core module in network security system,it's the highest occupancy rate of system resources is more than 70%.According to problem and challenges of pattern matching in the network security system,taking 2000 as the boundary,the pattern matching was divided into the traditional pattern matching method and the new pattern matching method.Through the analysis of the principle and the computational complexity of different pattern matching method and the development and evolution of the new pattern matching method,applicable environment of different methods was concluded.A comprehensive review and evaluation of pattern matching in network security system was presented.Finally,a conclusion and some suggestions for future research were summarized and prospected.…”
Get full text
Article -
268
Detection of the permutation symmetry in pattern sets
Published 2006-01-01“…Lastly, a genetic algorithm-based approach is designed for the symmetry detection problem. Computer simulation results are also given for five pattern sets of different dimensionality, which show the efficiency and speediness of the proposed detection approach, especially in high-dimensional cases.…”
Get full text
Article -
269
The Morphological Stenosis Pattern of the Caroticoclinoid Foramen
Published 2024-12-01“…The current study on dried skulls, using computed tomography (CT) and computed tomography angiography (CTA) scans, aimed to investigate the CCB’s presence and potential morphological stenosis patterns. …”
Get full text
Article -
270
Atypical Growth Pattern of an Intraparenchymal Meningioma
Published 2016-01-01“…No other relevant medical history and neurologic deficits were noted. Computed tomography and magnetic resonance imaging scans showed an irregular mass with a unique cerebriform pattern and extensive peritumoral edema in the parietal-occipital-temporal region of the right cerebral hemisphere. …”
Get full text
Article -
271
-
272
Etiology and patterns of mandibular fractures in cats
Published 2025-06-01“…The objectives of this study were (1) to examine the etiology and location of mandibular fractures at and distal to the mandibular canine tooth and (2) to identify patterns and risk factors associated with these fractures in client-owned cats.MethodsMedical records and computed tomography (CT) scans of cats with at least one mandibular fracture located at or distal to the mandibular canine tooth were reviewed. …”
Get full text
Article -
273
-
274
-
275
Methodology and standardised competence construction of 5GtoB scaled replication
Published 2022-05-01“…5GtoB is entering into the period of scaled replication.Without the reference from existing experience and from the pattern of toC industry, it has stepped into no man’s land.Based on theoretical and practical studies, it was aiming at analysing how 5GtoB can be successful from both methodology and standardised competence construction perspectives.Firstly, the methodology framework of 5GtoB success was raised.Secondly, from both key roles and scenario aspects, complex 5GtoB ecosystem was systematically investigated.Thirdly, the standardised competence of 5GtoB scaled replication was examined.Finally, from standardisation aspect, suggestion and perspective of 5GtoB key competence construction was thoroughly analysed.…”
Get full text
Article -
276
An Action Research on Basic Competence in Science and Technology in Social Studies Course
Published 2024-10-01“…The research was designed in action research pattern which is one of the qualitative research methods. …”
Get full text
Article -
277
Computer-Aided Application in Medicine and Biomedicine
Published 2025-08-01“…Pattern classification techniques, decision support systems, and the integration of supercomputers—particularly in drug development—are discussed, alongside natural user interfaces and the application of Computer Methods and Programs in Biomedicine, with attention to human–computer interface integration. …”
Get full text
Article -
278
-
279
CONE-BEAM COMPUTED TOMOGRAPHY IN PALEOANTHROPOLOGY
Published 2016-02-01“…Objective: to study the capabilities of cone-bean computed tomography (CBCT) in estimating the bone structure when analyzing anthropological findings.Material and methods. …”
Get full text
Article -
280