-
21
-
22
-
23
-
24
Studies on the use of 2D CNN-based models for spleen segmentation from 3D CT images.
Pubblicazione 2025Soggetti: -
25
-
26
Summary of key architectural modifications and hyperparameter adjustments from the U-Net to SVNC-Net.
Pubblicazione 2025Soggetti: -
27
Teacher Education Students' Use of Technology and AI
Pubblicazione 2025“...UNESCO’s AI Competency Framework for Teachers was used to frame this single case study. ...”
-
28
Unveiling ZIF‑8 Nucleation Mechanisms through Molecular Simulation: Role of Temperature, Solvent, and Reactant Concentration
Pubblicazione 2025“...Finally, important differences in the free energy of Zn–2-methylimidazolate versus Zn–imidazolate subsequent binding events are revealed and discussed. Interestingly, the free energy associated with subsequent binding events seems to be correlated with the formation of a larger variety of prenucleation building units in the case of imidazolate-based ZIFs, which could be at the onset of the existence of multiple polymorphs for this MOF....”
-
29
Unveiling ZIF‑8 Nucleation Mechanisms through Molecular Simulation: Role of Temperature, Solvent, and Reactant Concentration
Pubblicazione 2025“...Finally, important differences in the free energy of Zn–2-methylimidazolate versus Zn–imidazolate subsequent binding events are revealed and discussed. Interestingly, the free energy associated with subsequent binding events seems to be correlated with the formation of a larger variety of prenucleation building units in the case of imidazolate-based ZIFs, which could be at the onset of the existence of multiple polymorphs for this MOF....”
-
30
<b>Structural Determinants of Non-Covalent PPARγ Inverse Agonism and Their Therapeutic Implications</b>
Pubblicazione 2025“...HDX and molecular dynamic simulations revealed that ligand-induced dynamics within ligand-binding pocket and AF2 domain correlate with enhanced receptor binding and differential repression. ...”
-
31
Data Sheet 1_Conventions and research challenges in considering trust with socially assistive robots for older adults.pdf
Pubblicazione 2025“...By combining these dimensions, our proposed framework provides a foundation for future research to design tailored interventions, enhance interaction quality, and ensure reliable trust assessment methods in this domain. ...”
-
32
Fast and robust invariant generalized linear models
Pubblicazione 2025“...<p>Statistical integration of diverse data sources is an essential step in the building of generalizable prediction tools, especially in precision health. ...”
-
33
Integrating small mammal personality and population abundance into forest regeneration<b> </b>predictions for a managed, mixed species forest in Maine, USA
Pubblicazione 2025“...Here, we take a first step toward integrating small mammal populations and personalities into forest regeneration predictions, building a modeling framework with empirical data where possible and identifying knowledge gaps. ...”
-
34
آية الحجاب بين الحكم العادي ودليل الخطاب: دراسة أصولية عند المالكية
Pubblicazione 2024Testo
article -
35
Schematic visualization of the federated learning approaches.
Pubblicazione 2025“...(B) Decision tree aggregation framework (Scenario II): Here, the server determines the number of decision trees each hospital should build based on its proportional data size. ...”
-
36
Data Sheet 1_Transformation of residual open spaces into a green community hub: a case study from Sinza D, Dar es Salaam.pdf
Pubblicazione 2025“...Drawing on 1 year of participatory action research in Sinza D, the study traces how collaboration among researchers, grassroots leaders, and residents evolved through facilitation, reflection, and trust-building. The findings reveal that effective UCC nurtures grassroots leadership, embodied in extended planners, who are local actors mediating between community aspirations and institutional frameworks. ...”
-
37
-
38
MARA: A Malware Analysis Reasoning Agent for Interpretable Android Malware Detection
Pubblicazione 2025“...<p dir="ltr"><b>MARA</b> is a next-generation Android malware detection framework that transforms fragmented static and behavioral signals into coherent, human-understandable malicious behavior chains. ...”