-
4081
C2 pars interarticularis length on the side of high-riding vertebral artery with implications for pars screw insertion
Published 2025-05-01“…In preoperative planning, the identified C2PIL cut-off of ≤ 16 mm may assist surgeons in early recognition of HRVA. …”
Get full text
Article -
4082
School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites
Published 2025-07-01“…Findings suggest that students who only have school-provided devices are more heavily surveilled and that historically marginalized students may be at a higher risk of being flagged due to algorithmic bias. …”
Get full text
Article -
4083
Tympanosclerosis Presenting as Mass: Workup and Differential
Published 2016-01-01“…Various ear pathologies, with different treatment algorithms, may present as clinically similar to one another. …”
Get full text
Article -
4084
Higher-Order Accurate and Conservative Hybrid Numerical Scheme for Relativistic Time-Fractional Vlasov-Maxwell System
Published 2022-01-01“…Still, on the other hand, a significant fact or drawback of most algorithms is that they do not preserve conservation philosophies. …”
Get full text
Article -
4085
Different faces of the stethoscope: history, usefulness, evolution, contamination, and disinfection practices
Published 2024-11-01“…A stethoscope in medical practice, which comes into contact with many patients, poses a high risk of infection transmission and thus may increase the incidence of infection in healthcare facilities. …”
Get full text
Article -
4086
Real-world evidence market: key players and key segments
Published 2022-01-01“…Real-world data (RWD) and real-world evidence (RWE) are a valuable resource in the healthcare system. They may be necessary for administrators (to create and improve algorithms for treating patients with various nosologies), physicians (to make a better clinical decision in favor of the patient) and directly to patients and their relatives (to better understand the treatment process). …”
Get full text
Article -
4087
A Comparison of CALPUFF and LAPMOD Against the Project Sagebrush Datasets
Published 2025-06-01“…However, in four simulations carried out under low wind and very stable conditions, the model performances are poor. This may be due to the inability of CALMET to reproduce the vertical wind direction variations in a shallow layer close to the ground, but also to inappropriate turbulence dispersion algorithms in the dispersion models. …”
Get full text
Article -
4088
Toward quantum advantage with photonic state injection
Published 2025-07-01“…Finally, we study a computational subroutine of learning algorithms named probability estimation, and we show that the state injection scheme we propose may offer a potential quantum advantage in a regime that can be more easily achieved than state-of-the-art adaptive techniques. …”
Get full text
Article -
4089
Critical questions for Facebook’s virtual reality: data, power and the metaverse
Published 2021-12-01“…Through this case, we argue that VR as a data-intensive device is not one of unalloyed benefit, but one fraught with power inequity—one that has the potential to exacerbate wealth inequity, institute algorithmic bias, and bring about new forms of digital exclusion. …”
Get full text
Article -
4090
Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory
Published 2025-03-01“…Although several consensus algorithms have been proposed to solve these problems, their performance has not been fully evaluated. …”
Get full text
Article -
4091
Efficient knowledge updating method for inconsistent decision tables
Published 2024-12-01“…However, inconsistent decision tables (IDTs) may update with new coming objects due to the information collection and update. …”
Get full text
Article -
4092
New insights into methods to measure biological age: a literature review
Published 2024-12-01“…We discussed some novel biomarkers and algorithms that can capture the dynamic and multidimensional aspects of aging at different levels. …”
Get full text
Article -
4093
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
4094
Summoning the digital investor: Fintech apps and the shaping of everyday financial subjectivities
“…However, users themselves may resist the financial subjectivities promoted by fintech investing, driven by skepticism towards gamified and other algorithmic app features. …”
Get full text
Article -
4095
Optimal Decisions for Prepositioning Emergency Supplies Problem with Type-2 Fuzzy Variables
Published 2016-01-01“…Since the inherent complexity of fuzzy prepositioning problem may be troublesome, the existing methods are no longer effective in dealing with the proposed model directly. …”
Get full text
Article -
4096
The influence of eye model parameter variations on simulated eye-tracking outcomes
Published 2023-10-01“… The simulated data used in eye-tracking-related research has been largely generated using normative eye models with little consideration of how the variations in eye biometry found in the population may influence eye-tracking outcomes. This study investigated the influence that variations in eye model parameters have on the ability of simulated data to predict real-world eye-tracking outcomes. …”
Get full text
Article -
4097
An Uncertain Programming Model for Fixed Charge Transportation Problem with After-Sale Service
Published 2022-01-01“…Meanwhile, some indeterministic factors may occur during the transportation process; probability theory is not the best option due to the lack of adequate historical data. …”
Get full text
Article -
4098
The ethics of data interoperability: Mapping problems and strategies in biomedical data and beyond
Published 2025-06-01“…However, interoperability poses a number of ethical problems whose contours can prove especially challenging in comparison to how ethical harms take hold at other moments of the data life cycle (such as algorithmic processing or results dissemination). Taking biomedical data interoperability as a focal domain, this article provides an overview of data interoperability, maps the central ethical harms that may challenge interoperability projects, and proposes a response to these problems through an approach rooted in philosophical pragmatism. …”
Get full text
Article -
4099
Statistical dynamics of flowing red blood cells by morphological image processing.
Published 2009-02-01“…We analyze these interactions using computational morphological image analysis and machine learning algorithms to quantify the non-equilibrium fluctuations of cellular velocities in a minimal, quasi-two-dimensional microfluidic setting that enables high-resolution spatio-temporal measurements of blood cell flow. …”
Get full text
Article -
4100
Optimal Control of Epidemic Routing in Delay Tolerant Networks with Selfish Behaviors
Published 2014-04-01“…Most routing algorithms in delay tolerant networks (DTN) need nodes serving as relays for the source to carry and forward message. …”
Get full text
Article