Results 51 to 60 of about 9,895,757 (306)

SPAN - Terminal sterilization process analysis program [PDF]

open access: yes, 1969
Computer program, SPAN, measures the dry heat thermal sterilization process applied to a planetary capsule and calculates the time required for heat application, steady state conditions, and cooling.

core   +1 more source

Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright   +13 more
wiley   +1 more source

Balancing Accuracy and Efficiency in Vehicular Network Firmware Vulnerability Detection: A Fuzzy Matching Framework with Standardized Data Serialization

open access: yesInformatics
Firmware vulnerabilities in embedded devices have caused serious security incidents, necessitating similarity analysis of binary program instruction embeddings to identify vulnerabilities.
Xiyu Fang   +4 more
doaj   +1 more source

Financial Burden Associated With Hospitalisation Among Families of Childhood Brain Tumours in Australia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim   +8 more
wiley   +1 more source

Participatory plant breeding [PDF]

open access: yes, 2015
Participatory plant breeding (PPB) is the systematic and regular involvement of farmers as decision-makers in all stages of a plant breeding program. PPB falls within a spectrum of approaches that ranges from traditional plant breeding by farmers, with ...
CGIAR Systemwide Program on Participatory Research and Gender Analysis for Technology Development and Institutional Innovation
core   +1 more source

On the Code Vulnerability Detection Based on Deep Learning: A Comparative Study

open access: yesIEEE Access
Deep learning is one of the important methods to detect and fix vulnerabilities in software programs. How to represent code information and how to use artificial intelligence methods to learn and understand code semantics and other information are ...
Guiping Li, Yege Yang
doaj   +1 more source

Thermal analysis system /TAS-1/ program [PDF]

open access: yes, 1971
Digital computer program develops temperature control system which maintains various subsystems within proper temperature limits. Coding is simple and input rules are easy to use and remember.
Hultberg, J. A., Obrien, P. F.
core   +1 more source

Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley   +1 more source

Refactoring for Java-Structured Concurrency

open access: yesApplied Sciences
Structured concurrency treats multiple tasks running in different threads as a single unit, thereby improving reliability and enhancing observability. The existing IDE (Integrated Development Environment) does not provide sufficient support to leverage ...
Yang Zhang   +4 more
doaj   +1 more source

Lexical Similarity Between Argument and Parameter Names: An Empirical Study

open access: yesIEEE Access, 2018
Identifiers chosen by programmers convey rich semantic information that could be exploited to enhance program analysis for various software engineering tasks, e.g., anomaly detection, argument recommendation, and code completion.
Guangjie Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy