-
181
Cooperative Unit Systems: 1. Introduction and Raising Market Animals in a Group Setting
Published 2020-10-01“…To address these barriers of entry, systems such as cooperative animal units have been set up. …”
Get full text
Article -
182
Shoprite Holdings LtdCase Study: Challenges for Expansion in Africa
Published 2024-09-01“…Shoprite pursued mergers and acquisitions within its native country but established wholly owned subsidiaries as its preferred entry route for expanding into other African states. …”
Get full text
Article -
183
Mechanisms of Floor Heave in Roadways Adjacent to a Goaf Caused by the Fracturing of a Competent Roof and Controlling Technology
Published 2020-01-01“…In traditional sequential single-wing mining practices, one-entry longwall mining systems make it challenging to efficiently and smoothly transfer mining equipment during a continuous mining sequence. …”
Get full text
Article -
184
The effectiveness of virtual journal clubs on evidence-based practices application
Published 2024-09-01“…METHODS AND MATERIALS: Twenty-four entry-level MS and OTD students voluntarily took part in this study, completing pre- and post-tests using the OT-KACE survey. …”
Get full text
Article -
185
ACE2 : S1 RBD Interaction-Targeted Peptides and Small Molecules as Potential COVID-19 Therapeutics
Published 2021-01-01“…This screen identified cepharanthine as a promising candidate for development as a SARS-CoV-2 entry inhibitor.…”
Get full text
Article -
186
SLC35A2 gene product modulates paramyxovirus fusion events during infection.
Published 2025-01-01“…While UGT was essential for virus-cell fusion during SeV entry to the cell, it was not required for NDV or MuV entry. …”
Get full text
Article -
187
Cooperative Unit Systems: 1. Introduction and Raising Market Animals in a Group Setting
Published 2020-10-01“…To address these barriers of entry, systems such as cooperative animal units have been set up. …”
Get full text
Article -
188
A novel CCR5 mutation common in sooty mangabeys reveals SIVsmm infection of CCR5-null natural hosts and efficient alternative coreceptor use in vivo.
Published 2010-08-01“…These data clearly indicate that SIVsmm relies on CCR5-independent entry pathways in SM that are homozygous for defective CCR5 alleles and, while the extent of alternative coreceptor use in SM with CCR5 wild type alleles is uncertain, strongly suggest that SIVsmm tropism and host cell targeting in vivo is defined by the distribution and use of alternative entry pathways in addition to CCR5. …”
Get full text
Article -
189
Middle East respiratory syndrome coronavirus (MERS-CoV) internalization does not rely on DPP4 cytoplasmic tail signaling
Published 2024-12-01“…MERS-CoV is known to bind to the ectodomain of DPP4 to gain entry into the host cell. However, the role of the cytoplasmic tail in the entry process remains unclear. …”
Get full text
Article -
190
Development and Evaluation of a Low-Jitter Hand Tracking System for Improving Typing Efficiency in a Virtual Reality Workspace
Published 2025-01-01“…Despite its potential, the challenge of achieving efficient text entry in virtual reality persists. This study addresses this obstacle by introducing a novel machine learning-based solution, namely, the two-stream long short-term memory typing method, to enhance text entry performance in virtual reality. …”
Get full text
Article -
191
Herpes Simplex Virus-2 Glycoprotein Interaction with HVEM Influences Virus-Specific Recall Cellular Responses at the Mucosa
Published 2012-01-01“…Infection of susceptible cells by herpes simplex virus (HSV) requires the interaction of the HSV gD glycoprotein with one of two principal entry receptors, herpes virus entry mediator (HVEM) or nectins. …”
Get full text
Article -
192
The Impact of Electronic Health Records in Management of Chronic Diseases in Uganda: A Case Study of Kampala International Teaching Hospital.
Published 2024“…The study also revealed challenges that affect Electronic Health Records include lack of enough data personnel that leads to delayed data entry; and entry of incomplete data, work overload, and unreliable data in the system that leads to treatment errors. …”
Get full text
Thesis -
193
-
194
Constraints and sources of nonequilibrium: a case of radical market transformation in Brazil
Published 2010-01-01“…Illycaffé entered Brazil in 1991 with the simple goal of finding high quality coffee and with a simple but revolutionary procurement strategy based on a) direct interaction with farmers and b) on an Award for the best coffee quality beans. The entry of Illycaffé unleashed a series of long-lasting consequences and unintended effects that revolutionised the Brazilian coffee industry and enabled the emergence of the quality coffee sector from the undifferentiated segment of commodity production. …”
Get full text
Article -
195
College student’s social anxiety: a study of the young people mental health in digital age
Published 2021-02-01“…Hypotheses are there is no difference in social anxiety level based on the year of entry nor gender. The subjects are undergraduate college students totaled 364 people. …”
Get full text
Article -
196
THE IMPACT OF INSTITUTIONS ON ENTREPRENEURSHIP: A CASE OF VIETNAM
Published 2018-03-01“…Therefore, it is necessary to have specific policies to reduce the cost of market entry as well as more effective land use options to support entrepreneurship development in Vietnam.…”
Get full text
Article -
197
Revendication des droits civiques et préparation au « jour J » : mobilisation et stratégies des féministes radicales allemandes pour obtenir le droit de vote (années 1890-1918)...
Published 2022-03-01“…Finally, the article presents elements of the feminists' debate on how best to promote and prepare for women’s entry into politics, either in separate action or by working alongside men.…”
Get full text
Article -
198
Stability Study of Shield Tunnel Excavation Face Induced by Shield Chamber Pressure Entering in Shallow-Buried Sand Stratum
Published 2025-01-01“…[Objective] Solve the problem of excavation surface stability during shield tunneling with pressure entry in shallow-buried sandy stratum.To solve the problem of the stability of tunnel face of shield tunnel with pressure into the chamber in shallow buried sandy soil stratum. …”
Get full text
Article -
199
Optimization of joint strength in friction stir welded wood plastic composites using ANFIS and Cheetah Optimizer
Published 2025-01-01“…Optimization using the ANFIS model and the Cheetah Optimizer determined the optimal parameters of 1116 RPM for RS and 0.20 mm/s for WS, which resulted in a maximum flexural strength of 13.96 MPa after tool entry and 13.50 MPa before tool exit, along with consistent flexural modulus values. …”
Get full text
Article -
200
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01“…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
Get full text
Article