Results 61 to 70 of about 1,420,577 (310)
Remarks on the Balaban Index [PDF]
In this paper we compute some bounds of the Balaban index and then by means of group action we compute the Balaban index of vertex transitive graphs.
Ghorbani, Modjtaba
core
Non‐thermal plasma treatment of melanoma cells induced epithelial‐mesenchymal transition (EMT) in a dose‐dependent fashion. This report highlights the critical need to further investigate potential adverse effects of non‐thermal plasma for cancer therapy and to optimize treatment parameters for clinical translation. Despite the promising results of non‐
Eline Biscop+10 more
wiley +1 more source
A review of artificial intelligence in brachytherapy
Abstract Artificial intelligence (AI) has the potential to revolutionize brachytherapy's clinical workflow. This review comprehensively examines the application of AI, focusing on machine learning and deep learning, in various aspects of brachytherapy.
Jingchu Chen+4 more
wiley +1 more source
The temperature and chronology of heavy-element synthesis in low-mass stars [PDF]
Roughly half of the heavy elements (atomic mass greater than that of iron) are believed to be synthesized in the late evolutionary stages of stars with masses between 0.8 and 8 solar masses. Deep inside the star, nuclei (mainly iron) capture neutrons and
A Jorissen+39 more
core +1 more source
Abstract Purpose Single‐isocenter multitarget (SIMT) radiosurgery has become increasingly popular as advancement in planning and delivery systems have made this approach clinically viable. With targets varying in size and distance from isocenter, SIMT plans are highly complex with dynamic multileaf collimator (MLC) motion.
Hem Moktan+3 more
wiley +1 more source
The filamentous fungus Fusarium graminearum is a well-known cereal pathogen and F. avenaceum is a pathogen with a wide host range. Recently, both species were reported as causal agents of apple rot, raising concerns about postharvest yield losses and ...
Mladen Petreš+5 more
doaj +1 more source
Algorithms for Computing the Linearity and Degree of Vectorial Boolean Functions [PDF]
In this article, we study two representations of a Boolean function which are very important in the context of cryptography. We describe Möbius and Walsh Transforms for Boolean functions in details and present effective algorithms for their ...
Bouyukliev, Iliya, Bouyuklieva, Stefka
core
Abstract Purpose Breast cancer is a neoplastic disease with high prevalence among women. Radiotherapy is one of the principal treatment modalities for this disease, but it poses significant challenges. This study aimed to compare and evaluate the technical and dosimetric performance of conventional C‐arm linac systems and a new design, Halcyon, in the ...
Mustafa Çağlar+8 more
wiley +1 more source
Context-Bounded Analysis For Concurrent Programs With Dynamic Creation of Threads [PDF]
Context-bounded analysis has been shown to be both efficient and effective at finding bugs in concurrent programs. According to its original definition, context-bounded analysis explores all behaviors of a concurrent program up to some fixed number of ...
Mohamed Faouzi Atig+2 more
doaj +1 more source
Programming and Testing a Two-Tree Algorithm [PDF]
ACM Computing Classification System (1998): G.2.2, F.2.2.Recently, Markov, Vassilev and Manev [2] proposed an algorithm for finding the longest path in 2-trees. In this paper, we describe an implementation of the algorithm.
Ammerlaan, Joanna, Vassilev, Tzvetalin
core