Research on Optimization of Knowledge Graph Construction Flow Chart

Author(s):  
Fengru Li ◽  
Wei Xie ◽  
Xiaowei Wang ◽  
Zhe Fan
Keyword(s):  
Author(s):  
M.D. Ball ◽  
H. Lagace ◽  
M.C. Thornton

The backscattered electron coefficient η for transmission electron microscope specimens depends on both the atomic number Z and the thickness t. Hence for specimens of known atomic number, the thickness can be determined from backscattered electron coefficient measurements. This work describes a simple and convenient method of estimating the thickness and the corrected composition of areas of uncertain atomic number by combining x-ray microanalysis and backscattered electron intensity measurements.The method is best described in terms of the flow chart shown In Figure 1. Having selected a feature of interest, x-ray microanalysis data is recorded and used to estimate the composition. At this stage thickness corrections for absorption and fluorescence are not performed.


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2019 ◽  
Author(s):  
Jemmy Wiratama
Keyword(s):  

I'm an Science & Technology enthusiast. I still learn how to build a knowledge graph and how to write a paper.


Author(s):  
Carmine Petruzziello ◽  
Paolo Maurizio Soave

Introduction: Disk Battery Ingestion (DBI) is a cause of access to the emergency department (ED), especially in pediatric age. This problem, if not well managed, may lead to serious injuries, with several complications involving the gastrointestinal and respiratory tract. Objective: Aim of this review is to analyze the literature of the last 25 years to make a decisional flow-chart that may help the emergency physician. Methods: For this review 36 articles have been analyzed (8 articles and 28 case reports), from 1995 to 2019. Data considered from each study were: year of publication, type of study, population studied, type of battery, timing of ingestion, treatment, outcomes, complications. Results: A decisional flow-chart has been configured. X-ray should be performed as a first step in every stable patient, meanwhile CT scan should be performed in unstable patients. When the battery is still localized in the esophagus, endoscopy should be performed as soon as possible, meanwhile, when the battery is beyond the esophagus, it should be noted its diameter before taking a decision. Conclusion: The use of the flow-chart proposed may reduce the risk of consequences and severe injuries for the patients, helping the emergency physician in his decisional process.


Author(s):  
A-Yeong Kim ◽  
◽  
Hee-Guen Yoon ◽  
Seong-Bae Park ◽  
Se-Young Park ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document