Suggested Topics within your search.
Suggested Topics within your search.
-
1621
-
1622
Dissipative quantum Hopfield network: a numerical analysis
Published 2024-01-01Get full text
Article -
1623
-
1624
Differential Diagnosis of Fibrotic Hypersensitivity Pneumonitis with Its Non-Fibrotic Phenotype and Usual Interstitial Pneumonia During High-Resolution Computed Tomography
Published 2023-11-01“…When comparing the fHP and UIP groups, the distinctive signs of fHP were centrilobular nodules, mosaic pattern, as well as diffuse axial sign distribution.…”
Get full text
Article -
1625
Multidetector computed tomography angiography in clinically suspected hyperacute ischemic stroke in the anterior circulation: an etiological workup in a cohort of Brazilian patient...
Published 2015-05-01“…Objective The potential of computed tomography angiography (CTA) was assessed for early determination of stroke subtypes in a Brazilian cohort of patients with stroke. …”
Get full text
Article -
1626
18F-fluorodeoxyglucose positron emission tomography/ computed tomography of giant cell arteritis with lower extremity involvement in association with polymyalgia rheumatica
Published 2021-03-01“…A clinical diagnosis of polymyalgia rheumatica (PMR) was made, but there was a suboptimal response to glucocorticoid therapy, prompting further evaluation. 18F-fluorodeoxyglucose positron emission tomography/computed tomography (FDG PET/CT) revealed intense FDG uptake in the arteries of the bilateral lower extremities, head, and neck, but sparing the aorta, suggestive of an uncommon pattern of giant cell arteritis (GCA). …”
Get full text
Article -
1627
Qualitative assesement of newly formed bone after distraction osteogenesis of mandible in patients with facial asymmetry using 3 dimensional computed tomography
Published 2021-07-01“…Therefore, this study was conducted to assess the quality of the newly formed bone after distraction osteogenesis of mandible using 3 dimensional computed tomography (3DCT Scan) to evaluate its relation with relapse if any. …”
Get full text
Article -
1628
Evaluation of the Proximity of the Maxillary Teeth Root Apices to the Maxillary Sinus Floor in Romanian Subjects: A Cone-Beam Computed Tomography Study
Published 2025-07-01“…<b>Methods</b>: Data for the study were retrospectively obtained from cone-beam computed tomography (CBCT) scans. The evaluation considered the pattern of proximity to the sinus floor for each tooth type, comparisons of the sinus relationships of teeth within the same dental hemiarch, as well as those of homologous teeth, and variation in root-to-sinus distance in relation to sex and age. …”
Get full text
Article -
1629
Real-Time Encrypted Traffic Classification with Deep Learning
Published 2022-04-01Get full text
Article -
1630
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
1631
Electric Field‐Driven Conformational Changes in Molecular Memristor and Synaptic Behavior
Published 2025-06-01“…Abstract This paper demonstrates the use of molecular artificial synapses in neuromorphic computing systems designed for low energy consumption. …”
Get full text
Article -
1632
Scalable Container-Based Time Synchronization for Smart Grid Data Center Networks
Published 2025-03-01“…The CTSM optimizes resource utilization, security, and traffic management while reducing computational overhead. The model was benchmarked against five DCN topologies—DCell, Mesh, Skywalk, Dahu, and Ficonn—using Mininet simulations and a software-defined CloudFormation stack on an Amazon EC2 HPC testbed under realistic SG traffic patterns. …”
Get full text
Article -
1633
A compact wideband dielectric resonator antenna with optimized inhomogeneous material distribution
Published 2024-12-01Get full text
Article -
1634
-
1635
Un-English Accentual Patterns of the Interlanguage Prosody of Students Reading for a Master’s Degree in Applied Language Studies, University of Constantine: Underlying Causes and R...
Published 2017-06-01“…The author of the present research paper digitally recorded the renderings of 260 monomorphemic and affix words of different accentual patterns and moraic structures along with ten utterances performed by thirty two MA English majors at the Department of Letters and English Language, Constantine University 1. …”
Get full text
Article -
1636
Hybridization of a hidden Markov model using Elman neural network with application
Published 2014-07-01Get full text
Article -
1637
-
1638
Deep Learning-Based Dzongkha Handwritten Digit Classification
Published 2024-03-01“… In computer vision applications, pattern recognition is one of the important fields in artificial intelligence. …”
Get full text
Article -
1639
-
1640