Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 3
- Word processing 3
- Building, Iron and steel 2
- Cytodiagnosis 2
- Domestic relations 2
- Domestic relations courts 2
- Human anatomy 2
- Management 2
- Mathematics 2
- Steel, Structural 2
- 44.83 rheumatology, orthopedics 1
- Accounting 1
- Act of the general application 1
- Agriculture 1
- BASIC (Computer program language) 1
- Blood 1
- Business 1
- Business- finance 1
- Calculus 1
- Chemical reactions 1
- Chemistry 1
- Chemistry, Organic 1
- Child psychology 1
- Civil engineering 1
- Civilization 1
- Coloring books 1
- Communication 1
- Communication policy 1
- Computer networks 1
- Computer programs 1
-
3441
Optimal Printing and Post-Processing Modes of Polymer Products Manufactured Using SLA-Technology of Additive Мanufacturing
Published 2023-12-01“…At the initial stage of introducing of new production methods into various industries, the most studied and widely used control methods are usually used. …”
Get full text
Article -
3442
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
3443
Detection of Cancer Stem Cells from Patient Samples
Published 2025-01-01“…The existence of cancer stem cells (CSCs) in various tumors has become increasingly clear in addition to their prominent role in therapy resistance, metastasis, and recurrence. …”
Get full text
Article -
3444
A Corticobasal Syndrome Variant of Familial Creutzfeldt-Jakob Disease with Stroke-Like Onset
Published 2016-01-01“…Creutzfeldt-Jakob disease (CJD) is an untreatable rare human prion disease characterized by rapidly progressive dementia along with various neurological features, including myoclonus and sometimes other movement disorders. …”
Get full text
Article -
3445
Antidiabetic Medicinal Plants Used by the Basotho Tribe of Eastern Free State: A Review
Published 2016-01-01“…The present study attempted to update the various scientific evidence on the twenty-three (23) plants originating from different parts of the world but widely used by the Sotho people in the management of DM. …”
Get full text
Article -
3446
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Published 2014-01-01“…Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. …”
Get full text
Article -
3447
MRM-BERT: a novel deep neural network predictor of multiple RNA modifications by fusing BERT representation and sequence features
Published 2024-12-01“…RNA modifications play crucial roles in various biological processes and diseases. Accurate prediction of RNA modification sites is essential for understanding their functions. …”
Get full text
Article -
3448
Numerical Investigation of Hydraulic Fracture Propagation in Naturally Fractured Reservoirs Based on Lattice Spring Model
Published 2020-01-01“…The geometry of the hydraulic fracture network (HFN) may have implications for the optimization of hydraulic fracturing operations. Various parameters, including the in situ stress, treatment parameters (injection rate and fluid viscosity), and orientation of natural fractures (NFs), can significantly affect the interactions between hydraulic fracture (HF) and NFs and the final HFN. …”
Get full text
Article -
3449
Charles Bonnet syndrome in patients with geographic atrophy secondary to age-related macular degeneration: a cross-sectional study
Published 2025-01-01“…Characteristics of the visual hallucinations were reported to occur at various frequencies from daily to less than monthly, occur during various times of the day, and almost always last minutes at most. …”
Get full text
Article -
3450
RISK RANKING OF OPEN-END INVESTMENT FUNDS IN THE REPUBLIC OF CROATIA
Published 2017-11-01“…Both individuals and business entities are exposed to various types of risk on a daily basis. Since business conducts in contemporary market conditions are characterized by an increasingly higher level of insecurity, business entities have acknowledged the value of risk management. …”
Get full text
Article -
3451
Approximate Solutions, Thermal Properties, and Superstatistics Solutions to Schrödinger Equation
Published 2022-01-01“…Using the resulting energy equation and with the help of Matlab software, the numerical bound state solutions were obtained for various values of the screening parameter (α) as well as different expectation values via Hellmann-Feynman Theorem (HFT). …”
Get full text
Article -
3452
Implementation of the pancasila student profile strengthening project on sustainable lifestyle themes
Published 2024-08-01“…Qualitative research is carried out by utilizing various methodologies currently available in nature with the aim of interpreting the phenomena seen. …”
Get full text
Article -
3453
Establishment of a Shear Strength Prediction Model for Asphalt Mixtures with Raw Materials Properties and Design Parameters
Published 2021-01-01“…Thus, a shear strength prediction model considering the effects of various factors is proposed to guide the design of asphalt mixes. …”
Get full text
Article -
3454
The Effect of Silver Nanoparticles Stabilized with Tannic Acid for Nano-Priming on Zea mays L. Seeds Germination
Published 2024-11-01“…Silver nanoparticles (AgNPs) have various benefits for application in the agricultural sector, such as nano-seed priming to enhance seedling growth and development. …”
Get full text
Article -
3455
COVID-19 vaccination: Knowledge and perception of beneficiaries at a tertiary care center in Haryana, India
Published 2025-02-01“…Various barriers leading to vaccine hesitancy and facilitators for a vaccination program should be identified and addressed for the successful implementation of the program. …”
Get full text
Article -
3456
INVESTIGATION ON THE DYNAMICS OF MOVEMENT OF CYLINDRICAL CLEANING PIGS THROUGH THE BENDS OF PIPELINE SYSTEMS FOR FLUID TRANSPORTATION
Published 2024-06-01“…The dynamics of the movement of one-piece cylindrical cleaning pistons made of various materials (silicone compound, self-destructive elastic polymer composition, polyurethane foam assembly foam) in the pipelines of pipeline systems intended for fluid transportation were studied by modelling and experimentally. …”
Get full text
Article -
3457
Książka w środowisku lokalnym i regionalnym
Published 2007-01-01“…The local space and, partly, the regional one always shapes the reception, whereas the transmission, though to a various degree depending on a given form of communication, generates itself mainly in the global and/or all-national dimensions. …”
Get full text
Article -
3458
Peculiar index relations, 2D TQFT, and universality of SUSY enhancement
Published 2020-01-01“…By writing these quantities in the language of 2D topological quantum field theory (TQFT), we easily read off the S-duality action on the flavor symmetries of the AD quivers and also find expressions for the Schur indices of various classes of exotic AD theories appearing in different decoupling limits. …”
Get full text
Article -
3459
Optical Coherence Tomography (Angiography) Biomarkers in the Assessment and Monitoring of Diabetic Macular Edema
Published 2020-01-01“…Significant progress has been made in recent years in optical coherence tomography and angiography technology. At the same time, various parameters have been attributed the role of biomarkers creating the frame for new monitoring and treatment strategies and offering new insights into the pathogenesis of diabetic retinopathy and diabetic macular edema. …”
Get full text
Article -
3460
Heteroaryl-Fused Triazapentalenes: Synthesis and Aggregation-Induced Emission
Published 2025-01-01“…Interestingly, modified Suzuki cross-couplings with various boronic acids resulted in poor to moderate yields of <b>HetATAPs 2</b>–<b>5</b> which were arylated at the azole moiety. …”
Get full text
Article