Zobrazeno 1 - 10
of 4 965
pro vyhledávání: '"E., George"'
Autor:
Siddhi Ramesh, Emma Dyer, Monica Pomaville, Kristina Doytcheva, James Dolezal, Sara Kochanny, Rachel Terhaar, Casey J. Mehrhoff, Kritika Patel, Jacob Brewer, Benjamin Kusswurm, Arlene Naranjo, Hiroyuki Shimada, Nicole A. Cipriani, Aliya N. Husain, Peter Pytel, Elizabeth A. Sokol, Susan L. Cohn, Rani E. George, Alexander T. Pearson, Mark A. Applebaum
Publikováno v:
npj Precision Oncology, Vol 8, Iss 1, Pp 1-6 (2024)
Abstract A deep learning model using attention-based multiple instance learning (aMIL) and self-supervised learning (SSL) was developed to perform pathologic classification of neuroblastic tumors and assess MYCN-amplification status using H&E-stained
Externí odkaz:
https://doaj.org/article/3ee6eb5342a14a0d87b21a668f03f699
Publikováno v:
Journal of Family Medicine and Primary Care, Vol 13, Iss 10, Pp 4517-4520 (2024)
Background Scrub typhus, caused by Orientia tsutsugamushi, is a commonly occurring, but underdiagnosed rickettsial infection in India. Considering the high incidence of scrub typhus among patients with acute febrile illness in the hospital setting an
Externí odkaz:
https://doaj.org/article/eee5617f153145dcad9f3e9f6c082f68
Autor:
Dean Pym, Amanda J. Davies, Jessica O. Williams, Christine Saunders, Chloë E. George, Philip E. James
Publikováno v:
Platelets, Vol 35, Iss 1 (2024)
The impact of the biophysical environment on the platelet storage lesion (PSL) has mainly focused on reduced temperature storage, overlooking the significance of storage-induced shear stress. Shear stress in platelet storage refers to the frictional
Externí odkaz:
https://doaj.org/article/c70292073e1540ffae69e0da718b17ff
Publikováno v:
Indian Dermatology Online Journal, Vol 15, Iss 5, Pp 846-848 (2024)
Externí odkaz:
https://doaj.org/article/08a24a29097549228d533a6587092bf2
Autor:
Kowsigan Magesan, Parthopratim D Majumder, Mamta Agarwal, Amala E George, Vineeta Nair, Sudha K Ganesh, Jyotirmay Biswas
Publikováno v:
Indian Journal of Ophthalmology, Vol 72, Iss 12, Pp 1813-1814 (2024)
Externí odkaz:
https://doaj.org/article/5d61d18b71584a6eb36950be789ab835
Autor:
Robert E. George, MD, Caroline C. Bay, BA, Sarah M. Thornton, BA, Tammy Zhong, BS, Lauren P. Feeley, Alyssa M. Schappe, BS, Aaron M. Dingle, PhD, Samuel O. Poore, MD, PhD
Publikováno v:
Plastic and Reconstructive Surgery, Global Open, Vol 12, Iss 7, p e5955 (2024)
Background:. Plastic and reconstructive surgery is one of the most competitive residency programs, and given the increased number of applicants for a relatively fixed number of positions, successfully matching is a challenge. Match rates have decline
Externí odkaz:
https://doaj.org/article/08e5c187c55a40b18e70137919a2c400
Publikováno v:
eLife, Vol 12 (2024)
Functional interactions between the prefrontal cortex and hippocampus, as revealed by strong oscillatory synchronization in the theta (6–11 Hz) frequency range, correlate with memory-guided decision-making. However, the degree to which this form of
Externí odkaz:
https://doaj.org/article/59f2d86677654a6b86b9c2b4df1474bf
Publikováno v:
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 2, pages 71-88
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems was widely used in Cryptographic applications. This paper introduces a new security notation 'trusted security' for computation methods of elliptic cu
Externí odkaz:
http://arxiv.org/abs/2208.01635
Publikováno v:
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology o
Externí odkaz:
http://arxiv.org/abs/2208.01634
Publikováno v:
Fundamenta Informaticae, Volume 185, Issue 4 (July 7, 2022) fi:9350
An operating system kernel uses cryptographically secure pseudorandom number generator for creating address space localization randomization offsets to protect memory addresses to processes from exploration, storing users' password securely and creat
Externí odkaz:
http://arxiv.org/abs/2204.06882