Results 51 to 60 of about 527,814 (269)
Mobile edge computing has been developed as a promising technology to extend diverse services to the edge of the Internet of Things system. Motivated by the high flexibility and controllability of unmanned aerial vehicles (UAVs), a multi‐UAVs‐assisted ...
Shanxin Zhang, Runyu Cao, Zefeng Jiang
doaj +1 more source
In this study, we developed a deep learning method for mitotic figure counting in H&E‐stained whole‐slide images and evaluated its prognostic impact in 13 external validation cohorts from seven different cancer types. Patients with more mitotic figures per mm2 had significantly worse patient outcome in all the studied cancer types except colorectal ...
Joakim Kalsnes +32 more
wiley +1 more source
Evolutionary analysis across 32 placental mammals identified positive selection at residues H148 and W149 in the immune receptor FcγR1. Ancestral reconstruction combined with molecular dynamics simulations reveals how these mutations may influence receptor structure and dynamics, providing insight into the evolution of antibody recognition and immune ...
David A. Young +7 more
wiley +1 more source
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef +2 more
wiley +1 more source
New Dimensions of Functional Illiteracy in the Digital Economy
We explore the new aspects of functional illiteracy associated with the inability to seamlessly fit into the new economic reality that requires mastering skills and technologies adequate to the digital economy. Data on the level of computer literacy and
Marina Baskakova, Irina Soboleva
doaj +1 more source
Constitutional and legal foundations for countering terrorism using cyberspace
Background. The article is devoted to the constitutional and legal foundations of countering terrorism using cyberspace. With the development of digital technologies, crimes using the Internet have become more and more prosperous.
P.A. Guk, P.V. Korshunova, O.N. Kulagina
doaj +1 more source
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source
BİLGİTEKNOLOJİLERİNDEKİGELİŞMELER ÇERÇEVESİNDE BİLGİYE ERİŞİMİN YENİBOYUTLARI
20. yüzyılın sonlarından itibaren yaygınlaşmaya başlayan bilgi teknolojileri kullanım alanlarınıhızla genişletmektedir. Bilgi teknolojilerindeki hızlıgelişim, insanların bilgisayarlar yardımıyla istedikleri bilgiye zahmetsizce ulaşmasınısağlamaktadır. Bu
Tülay Bektaş Şeker
doaj
This work offers an up-to-date account of all the component parts of the Internet and the World Wide Web, from architecture to networking. The book discusses key specifications relating to electronic mail, such as MiMe encoding and SMTP, and shows how they are used to send mail worldwide.
openaire +2 more sources

