Showing 1,421 - 1,440 results of 8,109 for search 'computing patterns', query time: 0.11s Refine Results
  1. 1421

    Differential Diagnosis of Fibrotic Hypersensitivity Pneumonitis with Its Non-Fibrotic Phenotype and Usual Interstitial Pneumonia During High-Resolution Computed Tomography by I. E. Tuyrin, D. A. Kuleshov, M. V. Samsonova, A. L. Chernyaev, E. V. Kusraeva, N. V. Trushenko, S. Yu. Chikina, S. N. Avdeev

    Published 2023-11-01
    “…When comparing the fHP and UIP groups, the distinctive signs of fHP were centrilobular nodules, mosaic pattern, as well as diffuse axial sign distribution.…”
    Get full text
    Article
  2. 1422

    Multidetector computed tomography angiography in clinically suspected hyperacute ischemic stroke in the anterior circulation: an etiological workup in a cohort of Brazilian patient... by Felipe Torres Pacheco, Ingrid Aguiar Littig, Rubens Jose Gagliardi, Antônio Jose da Rocha

    Published 2015-05-01
    “…Objective The potential of computed tomography angiography (CTA) was assessed for early determination of stroke subtypes in a Brazilian cohort of patients with stroke. …”
    Get full text
    Article
  3. 1423

    18F-fluorodeoxyglucose positron emission tomography/ computed tomography of giant cell arteritis with lower extremity involvement in association with polymyalgia rheumatica by Ananya Panda, Gregory Wiseman, Matthew Koster, Kenneth Warrington, Geoffrey Johnson

    Published 2021-03-01
    “…A clinical diagnosis of polymyalgia rheumatica (PMR) was made, but there was a suboptimal response to glucocorticoid therapy, prompting further evaluation. 18F-fluorodeoxyglucose positron emission tomography/computed tomography (FDG PET/CT) revealed intense FDG uptake in the arteries of the bilateral lower extremities, head, and neck, but sparing the aorta, suggestive of an uncommon pattern of giant cell arteritis (GCA). …”
    Get full text
    Article
  4. 1424

    Qualitative assesement of newly formed bone after distraction osteogenesis of mandible in patients with facial asymmetry using 3 dimensional computed tomography by Abhay Datarkar, Bhavana Valvi, Suraj Parmar, Jagadish Patil

    Published 2021-07-01
    “…Therefore, this study was conducted to assess the quality of the newly formed bone after distraction osteogenesis of mandible using 3 dimensional computed tomography (3DCT Scan) to evaluate its relation with relapse if any. …”
    Get full text
    Article
  5. 1425

    Evaluation of the Proximity of the Maxillary Teeth Root Apices to the Maxillary Sinus Floor in Romanian Subjects: A Cone-Beam Computed Tomography Study by Vlad Ionuţ Iliescu, Vanda Roxana Nimigean, Cristina Teodora Preoteasa, Lavinia Georgescu, Victor Nimigean

    Published 2025-07-01
    “…<b>Methods</b>: Data for the study were retrospectively obtained from cone-beam computed tomography (CBCT) scans. The evaluation considered the pattern of proximity to the sinus floor for each tooth type, comparisons of the sinus relationships of teeth within the same dental hemiarch, as well as those of homologous teeth, and variation in root-to-sinus distance in relation to sex and age. …”
    Get full text
    Article
  6. 1426
  7. 1427

    Analysis of software defined security model and architecture by Chunmei GUO, Jun MA, Hao GUO, Xueyao BI, Ruhui ZHANG, Shaomin ZHU, Congyi YANG

    Published 2017-06-01
    “…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
    Get full text
    Article
  8. 1428

    Electric Field‐Driven Conformational Changes in Molecular Memristor and Synaptic Behavior by Chanjin Lim, Taegil Kim, YoungJu Park, Daeho Kim, ChaeHo Shin, Suji Ha, Jin‐Liang Lin, Yuan Li, Junwoo Park

    Published 2025-06-01
    “…Abstract This paper demonstrates the use of molecular artificial synapses in neuromorphic computing systems designed for low energy consumption. …”
    Get full text
    Article
  9. 1429

    Scalable Container-Based Time Synchronization for Smart Grid Data Center Networks by Kennedy Chinedu Okafor, Wisdom Onyema Okafor, Omowunmi Mary Longe, Ikechukwu Ignatius Ayogu, Kelvin Anoh, Bamidele Adebisi

    Published 2025-03-01
    “…The CTSM optimizes resource utilization, security, and traffic management while reducing computational overhead. The model was benchmarked against five DCN topologies—DCell, Mesh, Skywalk, Dahu, and Ficonn—using Mininet simulations and a software-defined CloudFormation stack on an Amazon EC2 HPC testbed under realistic SG traffic patterns. …”
    Get full text
    Article
  10. 1430
  11. 1431
  12. 1432

    Un-English Accentual Patterns of the Interlanguage Prosody of Students Reading for a Master’s Degree in Applied Language Studies, University of Constantine: Underlying Causes and R... by Mansour DJALAL

    Published 2017-06-01
    “…The author of the present research paper digitally recorded the renderings of 260 monomorphemic and affix words of different accentual patterns and moraic structures along with ten utterances performed by thirty two MA English majors at the Department of Letters and English Language, Constantine University 1. …”
    Get full text
    Article
  13. 1433
  14. 1434
  15. 1435

    Deep Learning-Based Dzongkha Handwritten Digit Classification by Yonten Jamtsho, Pema Yangden, Sonam Wangmo, Nima Dema

    Published 2024-03-01
    “… In computer vision applications, pattern recognition is one of the important fields in artificial intelligence. …”
    Get full text
    Article
  16. 1436
  17. 1437
  18. 1438

    Counting the Number of Squares of Each Colour in Cyclically Coloured Rectangular Grids by Marcus R. Garvie

    Published 2025-03-01
    “…Modular arithmetic is used to apply generalized <i>C</i>-coloured checkerboard patterns to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>m</mi><mo>×</mo><mi>n</mi></mrow></semantics></math></inline-formula> gridded rectangles, ensuring that colours cycle both horizontally and vertically. …”
    Get full text
    Article
  19. 1439

    Deep Learning Framework Using Transformer Networks for Multi Building Energy Consumption Prediction in Smart Cities by Samuel Moveh, Emmanuel Alejandro Merchán-Cruz, Maher Abuhussain, Yakubu Aminu Dodo, Saleh Alhumaid, Ali Hussain Alhamami

    Published 2025-03-01
    “…The framework incorporated weather parameters, occupancy patterns, and historical energy consumption data through multi-head attention layers, employing a 4000-step warm-up period and adaptive regularization techniques. …”
    Get full text
    Article
  20. 1440