Results 61 to 70 of about 3,057,310 (285)
Security analysis of security protocol Swift implementations based on computational model
Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was ...
Bo MENG +4 more
doaj
Objective: To investigate and evaluate the protective effect of the combination of Hyssopus officinalis and Dracocephalum moldavica on cerebral ischemia reperfusion rat model. Methods: The rat model of cerebral ischemia reperfusion was established and SD
Maimaitiming Maihemuti +2 more
doaj +1 more source
Concurrent Knowledge-Extraction in the Public-Key Model [PDF]
Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the ...
Yao, Andrew C., Yung, Moti, Zhao, Yunlei
core +2 more sources
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim +8 more
wiley +1 more source
Generating Chinese Event Extraction Method Based on ChatGPT and Prompt Learning
Regarding the scarcity of annotated data for existing event extraction tasks and the insufficient semantic mining of event extraction models in the Chinese domain, this paper proposes a generative joint event extraction model to improve existing models ...
Jianxun Chen, Peng Chen, Xuxu Wu
doaj +1 more source
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter +17 more
wiley +1 more source
PL-RSM Model of Supercritical CO2 Fast Extraction Phase of Argan Kernel Oil
Sovová’s Broken and Intact Cell (BIC) model predicts a linear curve in the fast extraction zone. However, the extraction behavior during the initial phase is commonly nonlinear, exhibiting a decreasing trend rather than the linear response predicted by ...
Thanachai Obchoei, Wiroj Limtrakarn
doaj +1 more source
Brain Extraction from Normal and Pathological Images: A Joint PCA/Image-Reconstruction Approach
Brain extraction from images is a common pre-processing step. Many approaches exist, but they are frequently only designed to perform brain extraction from images without strong pathologies.
Asturias, Alexander +8 more
core +1 more source
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
Various plant attributes, such as growing environment, growth cycle, and ecological distribution, can provide support to fields like agricultural production and biodiversity. This information is widely dispersed in texts.
Zhihao Zong +4 more
doaj +2 more sources

