-
221
“Wild strawberries” in Artificial Intelligence. Pedagogical Reflections on the Irreducible Human
Published 2025-08-01“…But the moral, creative, poetic, artistic, aesthetic and educational agere and intelligere will remain, even in the face of science-fictional perspectives, exclusively human prerogatives and responsibilities, those that allow us to recognise the beauty and poetry inherent in blackberry brambles and wild strawberries, white daisies, yellow buttercups or lilac carpets of veronicas in a fallow meadow, preserving them from the blindness of indiscriminate cutting determined by a blind algorithm. Machines that do not know, do not see and do not feel feelings, neither in the sphere of the emotional sphere, nor in that of the aesthetic and poetic dimension of man, which, as in Kant and Schiller, invites us to consider aesthetic judgement as part of the mind’s more refined faculties, together with the abilities of the rational mind, to be educated and refined in a game of harmony of the parts closely connected to genius, but also to the ingenuous and the sublime. …”
Get full text
Article -
222
Abscess of the spleen in typhoid fever: clinical and morphological interpretation of the complication
Published 2014-09-01“…Experience in diagnosis and treatment of such complication in young man is presented in this article. The diagnostic algorithm included the use of ultrasound diagnostics, computerized tomography and magnetic resonance imaging. …”
Get full text
Article -
223
BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques
Published 2024-04-01“…Recognizing the limitations of existing clustering routing methods in addressing security threats, our approach integrates blockchain technology to fortify WSNs against vulnerabilities such as man-in-the-middle attacks. The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
Get full text
Article -
224
Increase success rate of weather forecasts for the airfield by integration of measurements of meteorological parameters of the atmosphere
Published 2019-10-01“…The article considers, as an example, the algorithm of complex processing of information about the temperature profile in the aerodrome area, the structural scheme of the algorithm is obtained and te results of modeling the temperature profile and its complex evaluation are presented.…”
Get full text
Article -
225
A RARE CASE OF DEATH IN FORENSIC EXPERT PRACTICE AFTER INGESTION OF MANY FOREIGN BODIES INSIDE STOMACH
Published 2023-02-01“…We present a case of 33-year-old man, who died in the hospital, with macroscopic and microscopic features of developed purulent peritonitis due to perforation of the stomach as a result of foreign body ingestion. …”
Get full text
Article -
226
Ternary polynomial based key management scheme for wireless sensor network
Published 2013-12-01“…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
Get full text
Article -
227
Computer, Computer Science, and Computational Thinking: Relationship between the Three Concepts
Published 2024-01-01“…Computer science covers all phenomenon related to computers and consists primarily of man-made laws governing building, programming, and using computers. …”
Get full text
Article -
228
Filtering Data of High-Resolution Terrestrial Laser Scanner and Effects of Filtrations on the Landslide Monitoring
Published 2015-08-01“…Point cloud filtering algorithm has automatically obtained two filtered data as the ground and the non-ground. …”
Get full text
Article -
229
Abstract 268: Validation of an automated method to assess 24‐hour infarct volume in stroke patients
Published 2023-11-01“…Auto‐FIV and man‐FIV were highly correlated (r=0.8; p<0.001; mean dice coefficient of 0.61). …”
Get full text
Article -
230
The Potential Mechanism of Curcumin in Treating Oral Squamous Cell Carcinoma Based on Integrated Bioinformatic Analysis
Published 2023-01-01“…The enrichment analysis was performed by the ClusterProfiler algorithm and Metascape, respectively. Then, a protein-protein interaction network was created, and the maximal clique centrality algorithm was used to identify the top 10 hub genes. …”
Get full text
Article -
231
The impact of war-related traumatic events on the functional psycho-emotional state of student youth in a front-line city: preliminary findings of the study
Published 2025-04-01“…The revealed imperfection of organizational aspects on the part of the state and local authorities regarding timely support for the population in crisis situations, ensuring the provision of medical and psychological assistance, and the dissemination of information should be taken into account in the organizational algorithm in the event of a possible further occurrence of humanitarian, environmental, or man-made crises.…”
Get full text
Article -
232
Management of water scarcity in arid areas: a case study (Ziz Watershed)
Published 2021-03-01“…The real-time dam management algorithm is based on water balance equation and rule curves. …”
Get full text
Article -
233
Adjustment of angle error and tolerance allocation methods for RV reducers
Published 2025-07-01“…Combining with the optimal control theory and comprehensively considering factors such as transmission accuracy, adjustment man-hour cost, and measurement uncertainty, the optimal adjustment amount for each assembly step and the final error state were given. …”
Get full text
Article -
234
Wheel Tread Dynamic Detection Benchmark Positioning Method Based on Iterative Reweighted Least-squares Line Fitting
Published 2022-02-01“…Under the dynamic tilt condition, the experimental man-machine comparison deviations of flange height and thickness based on IRLS-LF positioning results are ±0.1mm and ±0.2mm respectively, and the both deviation range widths based on LSLF positioning results and fixed-parameter algorithm positioning results are about 0.8 mm. …”
Get full text
Article -
235
Idiopathic Intrahepatic Cholestasis as an Unusual Presentation of Hodgkin’s Disease
Published 2015-01-01“…Our findings emphasize the value of early liver biopsy in the diagnostic algorithm along with consideration of HL-related idiopathic intrahepatic cholestasis as a diagnosis of exclusion in cholestatic jaundice of obscure origin.…”
Get full text
Article -
236
Automated skin melanoma diagnostics based on mathematical model of artificial convolutional neural network
Published 2018-09-01“…The development of computer vision technology has allowed the development of technical vision systems that allow detec on and classifi ca on of skin diseases with a quality that is comparable and in some cases exceeds the values a ained by man.In this paper, the authors propose an algorithm for the primary diagnosis of skin melanoma based on deep neural networks, achieving an accuracy of 91% for melanoma in dermatoscopic images. …”
Get full text
Article -
237
EVOLUTION OF HIGH-FREQUENCY TRADE
Published 2018-03-01“…Present day exchange trade using computer algorithm (or high frequency robots) that can make independent trade decisions and function without man’s involvement is becoming quite usual. …”
Get full text
Article -
238
The Marine Safety Simulation based Electronic Chart Display and Information System
Published 2011-01-01“…The universal kriging interpolation is used in the route planning and to compute the water depth of any place in the sea bottom. The man-machine conversation method is taken to amend planned route to obtain autodeciding of feasibility according to ECDIS information, and the route monitoring algorithm is improved by enhancing its precision caused by screen coordinate conversion. …”
Get full text
Article -
239
Application of Short-Range LIDAR in Early Alerting for Low-Level Windshear and Turbulence at Hong Kong International Airport
Published 2014-01-01“…For some events that are smaller in spatial dimensions and are rapidly changing, such as low altitude windshear and turbulence associated with buildings or man-made structures, it would be necessary to involve meteorological instruments that offer greater spatial resolution. …”
Get full text
Article -
240
Management of Testicular Silicone Gel-Filled Prosthesis Rupture: Case Report of a Rare Event and a Review of the Literature
Published 2016-01-01“…There is no management algorithm. Case Presentation. A 55-year-old man presented to our outpatient department with altered consistency in his right testicular prosthesis and a painful right hemiscrotum with no systemic symptoms thirty-three years after the implantation of the prosthesis. …”
Get full text
Article