Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Donor-gifted nephrolithiasis: case-based analysis and comparative study

    Maxwell Sandberg1,*, Mark Xu1, Randall Bissette1, Jacob Malakismail2, Niara East3, Robenson Nguyen4, Jackson Nowatzke1, Robert Stratta5, Dean Assimos1,6, Colin Kleinguetl1

    Canadian Journal of Urology, Vol.32, No.6, pp. 633-641, 2025, DOI:10.32604/cju.2025.069091 - 30 December 2025

    Abstract Objectives: Donor-gifted nephrolithiasis—the presence of a stone in a donor kidney at the time of transplantation—is rare. Research is limited, and no consensus high-quality evidence guidelines exist, leaving selection criteria and management to individual provider discretion. We aimed to estimate the frequency and analyze patient and graft outcomes of deceased donor (DD) transplant recipients with stones in their kidneys at Wake Forest Baptist Medical Center. Methods: All DD renal transplants or patients receiving most of their care postoperatively after DD renal transplantation at our institution from 1979 to 2025 were reviewed. Stones were considered donor-gifted… More >

  • Open Access

    ARTICLE

    Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters

    Jin Wang1, Ying Liu1, Shuying Rao1, R. Simon Sherratt2, Jinbin Hu1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3849-3865, 2023, DOI:10.32604/cmc.2023.037150 - 31 March 2023

    Abstract Data security and user privacy have become crucial elements in multi-tenant data centers. Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements. In the data center network (DCN), short and long flows are sensitive to low latency and high throughput, respectively. The traditional security processing approaches, however, neglect these characteristics and requirements. This paper proposes a fine-grained security enhancement mechanism (SEM) to solve the problem of heterogeneous traffic and reduce the traffic completion time (FCT) of short flows while ensuring the security of multi-tenant traffic transmission. Specifically, More >

  • Open Access

    ARTICLE

    Interactive Human Interface for ERP Component Extraction from Gifted Children

    Kawther Benharrath1, Amine Ben Slama2,*, Balkine Khadoumi1, Mounir Sayadi1, Hervé Rix3, Olivier Meste3, Sophie Guetat5, Jérôme Lebrun3, Marie-Noële Magnie-Mauro4,5

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1063-1080, 2022, DOI:10.32604/iasc.2022.023446 - 08 February 2022

    Abstract In the last century, scientists started to give importance to gifted children (GC) and to understand their behavior. Since then, research has pursued the various categories of these children and their early diagnosis in order to find the best control of their skills. Therefore, most researchers focus on recent advances in electroencephalogram (EEG) and cognitive events. The event-related brain potentials (ERPs) technique is generally used in the cognitive neuroscience process. However, it is still a challenge to extract these potentials from a few trials of electroencephalogram (EEG) data. The N400 ERP component is an important… More >

Displaying 1-10 on page 1 of 3. Per Page