Results 51 to 60 of about 9,895,757 (306)
SPAN - Terminal sterilization process analysis program [PDF]
Computer program, SPAN, measures the dry heat thermal sterilization process applied to a planetary capsule and calculates the time required for heat application, steady state conditions, and cooling.
core +1 more source
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
Firmware vulnerabilities in embedded devices have caused serious security incidents, necessitating similarity analysis of binary program instruction embeddings to identify vulnerabilities.
Xiyu Fang +4 more
doaj +1 more source
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim +8 more
wiley +1 more source
Participatory plant breeding [PDF]
Participatory plant breeding (PPB) is the systematic and regular involvement of farmers as decision-makers in all stages of a plant breeding program. PPB falls within a spectrum of approaches that ranges from traditional plant breeding by farmers, with ...
CGIAR Systemwide Program on Participatory Research and Gender Analysis for Technology Development and Institutional Innovation
core +1 more source
On the Code Vulnerability Detection Based on Deep Learning: A Comparative Study
Deep learning is one of the important methods to detect and fix vulnerabilities in software programs. How to represent code information and how to use artificial intelligence methods to learn and understand code semantics and other information are ...
Guiping Li, Yege Yang
doaj +1 more source
Thermal analysis system /TAS-1/ program [PDF]
Digital computer program develops temperature control system which maintains various subsystems within proper temperature limits. Coding is simple and input rules are easy to use and remember.
Hultberg, J. A., Obrien, P. F.
core +1 more source
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
Refactoring for Java-Structured Concurrency
Structured concurrency treats multiple tasks running in different threads as a single unit, thereby improving reliability and enhancing observability. The existing IDE (Integrated Development Environment) does not provide sufficient support to leverage ...
Yang Zhang +4 more
doaj +1 more source
Lexical Similarity Between Argument and Parameter Names: An Empirical Study
Identifiers chosen by programmers convey rich semantic information that could be exploited to enhance program analysis for various software engineering tasks, e.g., anomaly detection, argument recommendation, and code completion.
Guangjie Li +3 more
doaj +1 more source

