Showing 22,781 - 22,800 results of 23,138 for search '"construction"', query time: 0.12s Refine Results
  1. 22781

    Establishment of a rapid and quantitative method for detecting the range of infection exposure in preclinical dental education by Ayaka Ueda, Yuki Shinoda-Ito, Kazu Takeuchi-Hatanaka, Takashi Ito, Shintaro Ono, Kimito Hirai, Kazuhiro Omori, Tadashi Yamamoto, Shogo Takashiba

    Published 2025-02-01
    “…Conclusions An education system for infection control constructed using artificial saliva containing Lactobacillus and a UV-sensitive fluorescent hand lotion quantified the infectious areas and degrees. …”
    Get full text
    Article
  2. 22782

    Eugenol inhibits NEAT1 as a ceRNA in pre-cancerous breast lesions by Yusheng Liu, Guijuan Zhang, Yi Ma, Min Ma, Xuefeng Jiang

    Published 2025-01-01
    “…Results: There were altogether 1162 mRNAs, 81 miRNAs, and 26 lncRNAs recognized as trend genes in breast cancer (BC) and pre-cancerous BC (pBC), constructing the ceRNA network using 3 lncRNAs, 3 miRNAs, and 38 mRNAs. …”
    Get full text
    Article
  3. 22783

    Bank collapse-landslide failure mechanism of typical reverse rock bank slope in Three Gorges Reservoir area by Yang LI, Hailin ZHAO, Bolin HUANG, Honglin LI, Kaikai XU

    Published 2025-01-01
    “…To further analyze the failure mechanism and disaster process of bank collapse-landslide under the constraint condition of bank collapse, this study constructed a two-dimensional model of Gongjiafang landslide in Wuxia section of Three Gorges Reservoir area to analyze the failure mechanism of bank collapse-landslide of typical reverse rock bank slope under the erosion of reservoir water level. …”
    Get full text
    Article
  4. 22784

    Exploration of urease-aided calcium carbonate mineralization by enzyme analyses of Neobacillus mesonae strain NS-6 by Zhiwei Ma, Mengyao Chen, Juncheng Lu, Shichuang Liu, Yanling Ma

    Published 2025-01-01
    “…Homology modeling and molecular docking were employed to construct the three-dimensional structure of urease and seek the key residues involved in nickel binding process, and virtual mutation technology was adopted to inform three key residues coordinated with nickel ions and urea, His249, His275, and Asp363. …”
    Get full text
    Article
  5. 22785

    The Patient-Reported Outcomes Thermometer–5-Item Scale (5T-PROs): Validation of a New Tool for the Quick Assessment of Overall Health Status in Painful Rheumatic Diseases by Fausto Salaffi, Marco Di Carlo, Marina Carotti, Sonia Farah

    Published 2018-01-01
    “…Objective. To investigate the construct validity, reliability (internal consistency and retest reliability), and feasibility of the patient-reported outcomes thermometer–5-item scale (5T-PROs), a new tool to measure overall health status in patients with painful chronic rheumatic diseases such as rheumatoid arthritis (RA), psoriatic arthritis (PsA), axial spondyloarthritis (axialSpA), and fibromyalgia (FM). …”
    Get full text
    Article
  6. 22786

    Intimate partner violence help-seeking norms: scale reliability and cross-sectional multilevel associations with intimate partner violence among youth in Nairobi, Kenya by Peter Gichangi, Mary Thiongo, Anaise Williams, Bianca Devoto, Shannon N. Wood, G Wamue-Ngare, Kristin G. Bevilacqua, Michele R. Decker

    Published 2025-01-01
    “…Cross-sectional exploratory factor analysis assessed underlying latent constructs. Multilevel mixed-effects models assessed associations with IPV experience for young women.Setting and participants A youth cohort of 586 men and 591 women aged 15–24 years in Nairobi, Kenya.Primary outcome measure Past 6-month physical and/or sexual IPV among young women.Results The IPV Help-Seeking Attitudes Scale had acceptable internal reliability (Cronbach’s alpha >0.60). …”
    Get full text
    Article
  7. 22787

    IL-17 triggers PD-L1 gene transcription in NSCLC cells via TRIM31-dependent MEF2C K63-linked polyubiquitination by Shuai Ying, Ningxia Wu, Yuting Ruan, Wen Ge, Pei Ma, Tongpeng Xu, Yongqian Shu, Yingwei Wang, Wen Qiu, Chenhui Zhao

    Published 2025-01-01
    “…The corresponding plasmids were constructed and identified. An isograft model was used to verify the findings in vitro. …”
    Get full text
    Article
  8. 22788

    The prognostic role of vasculoendothelial growth factor A in patients with ST-segment elevation acute myocardial infarction during 6-months follow-up period by N.P. Kopytsya, I.M. Кutya, I.V. Rodionova, Ya.V. Hilova

    Published 2020-06-01
    “…The prognostic model for the development of adverse events during 6 months follow-up is constructed, with inclusion of the VEGF-A, LDL-C concentration and complications in the acute period of the disease, increases the accuracy of prediction power predominantly because of higher specificity.…”
    Get full text
    Article
  9. 22789

    Predicting Treatment Outcomes in Patients with Low Back Pain Using Gene Signature-Based Machine Learning Models by Youzhi Lian, Yinyu Shi, Haibin Shang, Hongsheng Zhan

    Published 2024-12-01
    “…From these genes, 45 machine learning models were constructed using different combinations of feature selection methods and classification algorithms. …”
    Get full text
    Article
  10. 22790

    Hsa-miR-532-3p protects human decidual mesenchymal stem cells from oxidative stress in recurrent spontaneous abortion via targeting KEAP1 by Hong Zhou, Jiaxin Zhou, ShanShan Liu, Jing Niu, Jinghua Pan, Ruiman Li

    Published 2025-03-01
    “…A mouse model of RSA was constructed for confirmation. Finally, we analyzed the correlations between serum hsa-miR-532-3p levels and the clinical features of pregnant women with RSA. …”
    Get full text
    Article
  11. 22791

    Mechanism of <italic>Coptis chinensis</italic> in Treatment of Type 2 Diabetes Mellitus Based on Network Pharmacology and Molecular Docking by LIU Huiling, TAN Dingying, HUANG Min, CHEN Pingping, ZHANG Wang

    Published 2021-12-01
    “…The corresponding target of active ingredients and related targets of type 2 diabetes mellitus were retrieved through UniProt database and CTD database; Cytoscape 3.6.1 software was used to make the visual network diagram of "<italic>Coptis chinensis</italic>-active ingredients-targets", and STRING database was used to construct the PPI network diagram of intersection targets, and the core targets were analyzed by GO function enrichment and KEGG pathway enrichment. …”
    Get full text
    Article
  12. 22792

    Identification of Anoikis-Related Genes in Chronic Kidney Disease Based on Bioinformatics Analysis Combined with Experimental Validation by Liu H, Mei M, Zhong H, Lin S, Luo J, Huang S, Zhou J

    Published 2025-01-01
    “…And then, we adopted the quantitative real-time PCR (RT-qPCR) assay to validate the hub genes among several CKD animal models. Furthermore, we constructed a competitive endogenous RNA (ceRNA) network for the hub genes utilizing the ENCORI and miRDB databases, while also calculating Spearman correlation coefficients. …”
    Get full text
    Article
  13. 22793

    Preliminary study on the coconut crab (Birgus latro) rearing in captive pond by . Sulistiono, M.M. Kamal, Nurlisa A. Butet

    Published 2009-01-01
    “…The rearing activity was done in captive pond sized 5x5x1.3 m3 divided into 22 smaller ponds sized 1x1x1.3 m3 with a hiding hole (constructed by pile stones), supported by two small ponds sized 30x40x40 cm3 for sea and fresh water stocks, respectively.  …”
    Get full text
    Article
  14. 22794

    Mediating effects of occupational self-efficacy on the relationship of authentic leadership and job engagement by Popy Podder, Hillol Saha

    Published 2024-10-01
    “…Moreover, the findings of this study depict the importance to understand the constructions like leaders' authenticity that lead to the promotion of confidence in their employees and, as such, an increase in their JE and performance. …”
    Get full text
    Article
  15. 22795

    Comprehensive Sepsis Risk Prediction in Leukemia Using a Random Forest Model and Restricted Cubic Spline Analysis by Kou Y, Tian Y, Ha Y, Wang S, Sun X, Lv S, Luo B, Yang Y, Qin L

    Published 2025-01-01
    “…Seven machine learning models were constructed and evaluated using receiver operating characteristic (ROC) curves and decision curve analysis (DCA). …”
    Get full text
    Article
  16. 22796

    Dual-stack host discovery method based on SSDP and DNS-SD protocol by Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU

    Published 2023-02-01
    “…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
    Get full text
    Article
  17. 22797

    Simulation and Test of Key Decorticating Components of Spiral Ramie Decorticator by Wenlong Zheng, Lan Ma, Jiajie Liu, Bo Yan, Yiping Duan, Sixun Chen, Jiangnan Lyu, Wei Xiang

    Published 2025-01-01
    “…The Box–Behnken experimental design method was used to construct a mathematical model describing the effects of the decorticating drum rotation speed and the decorticating gap on the fiber percentage of fresh stalk, and the optimal operating parameters were determined accordingly. …”
    Get full text
    Article
  18. 22798

    A Nomogram Based on Laboratory Data, Inflammatory Bowel Disease Questionnaire and CT Enterography for Activity Evaluation in Crohn&rsquo;s Disease by Zhang H, Shen Y, Cao B, Zheng X, Zhao D, Hu J, Wu X

    Published 2025-01-01
    “…Multivariate logistic regression analysis identified the independent risk factors of erythrocyte sedimentation rate, fecal calprotectin, and Inflammatory Bowel Disease Questionnaire (IBDQ), and a nomogram was constructed in combination with rad-score. The nomogram underwent evaluation and testing in the training set (n = 84) and validation set (n = 23), respectively.Results: The discrimination performance of the combined (AUC 0.877) was marginally superior to that of IBDQ + clinical (AUC 0.854). …”
    Get full text
    Article
  19. 22799

    Use of Texture Analysis on Noncontrast MRI in Classification of Early Stage of Liver Fibrosis by Ru Zhao, Xi-Jun Gong, Ya-Qiong Ge, Hong Zhao, Long-Sheng Wang, Hong-Zhen Yu, Bin Liu

    Published 2021-01-01
    “…After statistical analyses, final diagnostic models were constructed. Receiver operating curves (ROCs) and areas under the ROC (AUCs) were used to assess the diagnostic value of each final model and 100-time repeated cross-validation was applied to assess the stability of the logistic regression models. …”
    Get full text
    Article
  20. 22800

    Cellular Cholesterol Loss Impairs Synaptic Vesicle Mobility via the CAMK2/Synapsin-1 Signaling Pathway by Atikam Qurban, Mengqi Zhang, Hengbing Zu, Kai Yao

    Published 2025-01-01
    “…Methods: Lentiviruses carrying 3β-hydroxysteroid-Δ24 reductase-complementary DNA (DHCR24-cDNA), DHCR24-short hairpin RNA (DHCR24- shRNA) or empty lentiviral vectors were transfected into SHSY-5Y cells in order to construct DHCR24 knock-down and knock-in models, along with corresponding controls. …”
    Get full text
    Article