Results 41 to 50 of about 8,951 (175)
Acupuncture anesthesia (AA) is an application of acupuncture innovation in surgical operations, combined with anesthetic techniques, and is a model of integrated Chinese and Western medicine. We proposed the Acupuncture Anesthesia Knowledge Database (AAKD), in which all data have been meticulously curated by field experts and assessed by a multi ...
Ying Wang +11 more
wiley +1 more source
Currently, the information environment of many large organizations is represented by a cluster of web-oriented information systems. Often these information systems are based on the Ruby on Rails framework.
David A. Khotelov +4 more
doaj +1 more source
Serendipity and strategy in rapid innovation
Innovation is to organizations what evolution is to organisms: it is how organisations adapt to changes in the environment and improve. Governments, institutions and firms that innovate are more likely to prosper and stand the test of time; those that ...
Farr, R. S. +3 more
core +2 more sources
AlkaPlorer: A database‐driven explorer for natural alkaloids and derivatives
The alkaloid database AlkaPlorer integrates over 130,000 compounds across 12,250 species. By linking chemical structures with biological and evolutionary data, it reveals how these molecules evolve and function. This platform serves as a vital resource for AI‐driven discovery in plant metabolism and modern drug development. ABSTRACT Alkaloids, renowned
Jiahao Li +5 more
wiley +1 more source
Research on distributed storage of 3D stack grid model of coal mine geology based on HDF5
The realization of multi-resolution expression and multi-parameter fusion of coal mine geological environment by using true 3D gridded geological model is one of the key contents of coal mine geological big data research.
GUO Jun
doaj +1 more source
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor.
Baumann A. +9 more
core +1 more source
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Perancangan dan Implementasi Presensi Digital Guru dan Karyawan SMA Negeri 9 Semarang
Berdasarkan surat edaran dari Kepala Dinas Pendidikan Kota Semarang, terhitung mulai Januari 2015 tiap sekolah dihimbau untuk beralih dari sistem presensi manual menjadi digital.
Th. Didot Septiawan +2 more
doaj +1 more source
High Concurrency Iris Recognition System Based on B/S Architecture [PDF]
The scanning,processing and identification processes of existing iris login systems are under the same physical machine,which leads to the problems of high use cost and few benefited users.Therefore,an iris login system model is proposed.This model ...
XU Yuntao, XU Wujun, ZHAI Menglin
doaj +1 more source
АНАЛІЗ І ПРОЕКТУВАННЯ РОЗПОДІЛЕНИХ СИСТЕМ НА ОСНОВІ КЛАСТЕРНИХ ТЕХНОЛОГІЙ
У даній роботі виконано огляд деяких сучасних рішень, що забезпечують аналіз і проектування розподілених систем на основі кластерних технологій. Ці рішення ґрунтуються на використанні теореми CAP, яка стверджує, що для розподіленої комп'ютерної системи ...
Victor Grechaninov
doaj +1 more source

