Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 3
- Word processing 3
- Building, Iron and steel 2
- Cytodiagnosis 2
- Domestic relations 2
- Domestic relations courts 2
- Human anatomy 2
- Management 2
- Mathematics 2
- Steel, Structural 2
- 44.83 rheumatology, orthopedics 1
- Accounting 1
- Act of the general application 1
- Agriculture 1
- BASIC (Computer program language) 1
- Blood 1
- Business 1
- Business- finance 1
- Calculus 1
- Chemical reactions 1
- Chemistry 1
- Chemistry, Organic 1
- Child psychology 1
- Civil engineering 1
- Civilization 1
- Coloring books 1
- Communication 1
- Communication policy 1
- Computer networks 1
- Computer programs 1
-
6121
Role of NKT Cells in the Pathogenesis of NAFLD
Published 2012-01-01“…Nonalcoholic fatty liver disease (NAFLD) is the most frequent chronic liver disease and shows various inflammatory changes in the liver. Among those inflammatory cells, natural killer T (NKT) cells are found to have a critical role during the disease progression. …”
Get full text
Article -
6122
A survey of semantic applications in communications
Published 2022-05-01“…With the development of artificial intelligence technology and wireless communication technology, the future communication networks for all things intelligent connected uses semantic segmentation, semantic network and other technologies more and more frequently, and the semantic information-based technologies are applied to various fields.Semantic communication is a communication method for multi-agent interaction.By extracting the requirements and information characteristics of agents, coding and transmission, the accurate transmission of semantics from agents can be realized.Firstly, the development of semantic related technology in artificial intelligence was analyzed.And then the application of semantics in communication was summarized.Finally, the application of semantic information in other fields was analyzed, and the development trend of semantics in other fields was discussed.…”
Get full text
Article -
6123
Enhancing the Classical Closed-Loop Algorithm in terms of Power Consumption
Published 2015-01-01“…Extensive numerical analyses by using various scalar functions show that the proposed strategy effectively can reduce the need of the required control force consumptions.…”
Get full text
Article -
6124
Un cas médiéval d’abrasion dentaire singulière : un possible témoignage d’activités para-masticatrices ?
Published 2005-12-01“…The study of the nature and orientation of the furrows on the teeth enables us to present various hypotheses for the origin of the abrasions.…”
Get full text
Article -
6125
Exact Determinants of Some Special Circulant Matrices Involving Four Kinds of Famous Numbers
Published 2014-01-01“…Circulant matrix family is used for modeling many problems arising in solving various differential equations. The RSFPLR circulant matrices and RSLPFL circulant matrices are two special circulant matrices. …”
Get full text
Article -
6126
Formas de sacralizar a la figura real entre los mayas
Published 2015-12-01“…The present study aims to identify the various iconographic traits as well as the concepts generated around the figure of the ruler in Lowlands’ architecture-integrated sculpture during the early Classic – a sculptural format that is one of the most elaborate expressions of glorification and exaltation of the Maya rulers.…”
Get full text
Article -
6127
2018–2019 Florida Citrus Production Guide: Citrus Root Weevils
Published 2018-08-01“… Citrus root weevils represent a complex of species known to infest citrus trees and various alternate host plants in Florida. This 5-page fact sheet is part of the 2018–2019 Florida Citrus Production Guide. …”
Get full text
Article -
6128
Research on architecture of novel programmable networks for 6G
Published 2021-12-01“…Starting from the industry’s various business scenarios for 6G networks, and the dynamic network capability adjustment requirements for 6G network equipment were deeply analyzed.A programmable network platform architecture with the characteristics of closed-loop self-optimization based on network state management was proposed.Through this architecture design, the existing technology systems related to SDN, NFV, and network AI can be maximized and network administrators can perform network lifecycle management based on network status statements.This platform can provide a new technical realization idea and method for the digital twin network and on-demand network in the future.…”
Get full text
Article -
6129
Enhancing Motivation through Work Meaningfulness
Published 2019-03-01“… Proper human resources management can strengthen an organization through strategic talent recruitment and adequate benfits, but employee motivation is also needed to limit absenteeism and ensure an organization is reaching its fullest potential. Research shows various methods that an organizational leader can take to motivate employees by connecting them closer to the meaning of their work. …”
Get full text
Article -
6130
A Heart Rate Monitoring and Notification System Using Arduino Platform
Published 2024-06-01“…Heart rate measurements are widely used for various purposes that require an accurate and reliable method to measure it. …”
Get full text
Article -
6131
QoS rerouting mechanism for SON
Published 2012-11-01“…Along with the development of computer network,SON(self-organizing network)has attracted wide attention with its flexibility,adaptability,robustness.On the basis of OSPFv3,the interactive message of QoS state was defined to establish the information table of neighbors,store the link QoS information,judge the triggering of rerouting,and then the biological behaviors,such as hibernation and awakening,were introduced to the routing nodes.A hybrid rerouting mechanism was adopted to make the corresponding treatment under various network failure situations,so that the application QoS support could be provided when the network state was changing.Simulation results show that the proposed mechanism has better performance.…”
Get full text
Article -
6132
R-SYSTEM AND INFORMATION TECHNOLOGIES AS TOOLS FOR ECONOMIC INTELLIGENCE IN ORGANIZATIONS
Published 2017-03-01“…Evolution of contemporary information technologies, focus on market mechanisms for interaction between organizations, business activity in conditions of high uncertainty lead to necessity of implementation of various economic intelligence methods. One of such economic intelligence methods is the usage of R-system which allows to identify risks of business projects, analyze business partners and competitors using data from open data sources. …”
Get full text
Article -
6133
Étrange ou ennemi ? Typologie de l’étranger, construction identitaire et circonvolutions du discours dans l’Angleterre des XVIe et XVIIe siècles
Published 2008-03-01“…Taking Bacon’s and Coke’s definitions of strangers in the Case of the Post-Nati (1605) as a starting point, this article examines the implications of defining English citizens as subjects owing allegiance to the King of England by looking at the various types of allegiance (which may be implicit or explicit, geographically or temporally limited or unlimited). …”
Get full text
Article -
6134
Factors Influencing Public Attitudes and Willingness to Utilize Telepharmacy Services in the UAE
Published 2024-01-01“…Conclusion: Forthcoming healthcare strategies should focus on expanding the availability of telepharmacy services throughout various regions of the country. This expansion will facilitate the broader utilization of these services and ultimately contribute to improved health outcomes.…”
Get full text
Article -
6135
Biological computing with diffusion and excitable calcium stores
Published 2004-02-01“…We investigate the ability of various geometric configurations of such excitable stores to generate a complete set of logic gatesfor computation. …”
Get full text
Article -
6136
New data fusion model of intrusion detection——IDSFP
Published 2006-01-01“…Based on multi-sensor data fusion technology,a new intrusion detection data fusion model-IDSFP was pre-sented.The model was characterized by correlating and merging alerts of different types of IDS,generating the measures of the security situation,thus constituting the evidence.Current security situation of network was evaluated by applying the D-S evidence theory,and various IDS of network were adjusted dynamically to strengthen the detection of the data which relates to the attack attempt.Consequently,the false positive rate and the false negative rate are effectively reduced,and the detection efficiency of IDS is accordingly improved.…”
Get full text
Article -
6137
Context-aware and self-adaptive trust model for pervasive computing
Published 2012-11-01“…To cope with the behaviour trust problems emerging at ve environments,a context-aware and selfadaptive trust model(CASATM) for pervasive environments was proposed,the trust model provided security protection based on service content adaptively at various level,nd be sensitive to contexts such as time,location and service content.A simple and efficient risk evaluation model was presented to initialize trust value to unknown entities which was a common phenomenon in pervasive environments.Simulation results testify to the contexts awareness of this model,as well as resistance of periodically cheating behaviour from malicious entity.…”
Get full text
Article -
6138
2012–2016 On-Farm Evaluation of Fungicide Programs for Peanut Disease Control in Hamilton County, Florida
Published 2017-09-01“… This ten-page fact sheet includes a summary of various fungicide spray programs for fungal disease control of early leaf spot, late leaf spot, and white mold/stem rot of peanut in 2012-2016 on-farm trials in Hamilton County. …”
Get full text
Article -
6139
Gorham’s Disease of the Mandible
Published 2013-01-01“…Because of the rarity, the disorder goes unrecognized. Various treatment modalities are undertaken with very limited success. …”
Get full text
Article -
6140
The Practice and Potential of Agroforestry in the Southeastern United States
Published 2004-07-01“…This will be done by presenting readers with the various opportunities available in agroforestry, based on a review of current and potential practices in the southeastern United States. …”
Get full text
Article