Showing 3,121 - 3,140 results of 4,506 for search '"count"', query time: 0.10s Refine Results
  1. 3121

    Nailfold Capillary Hemorrhages: Microvascular Risk Factors for Primary Open-Angle Glaucoma by Nicholas M. Pfahler, Jordan L. Barry, Indre E. Bielskus, Agni Kakouri, Michael C. Giovingo, Nicholas J. Volpe, Paul A. Knepper

    Published 2020-01-01
    “…The number of hemorrhages, dilated capillaries >50 µm, and avascular zones ≥200 µm were counted and adjusted to counts per 100 capillaries. …”
    Get full text
    Article
  2. 3122

    A Study of Synergy of Combination of Eosin B with Chloroquine, Artemisinin, and Sulphadoxine-Pyrimethamine on Plasmodium falciparum In Vitro and Plasmodium berghei In Vivo by Sedigheh Sadeghi, Zarrintaj Valadkhani, Alireza Sadeghi Tafreshi, Mohammad Arjmand, Hossein Nahravanian, Farideh Vahabi, Neda Soori, Maryam Mohammadi, Masoomeh Meigooni, Zahra Zamani

    Published 2020-01-01
    “…Percent parasitemia of live cells was obtained by microscopic counting. Peter’s suppression test was carried out on mice infected with Plasmodium berghei after 3 administration of the drugs singly and in combination, and parasites were counted by microscopy for 10 days. …”
    Get full text
    Article
  3. 3123

    Therapeutic Inhibition of Cathepsin S Reduces Inflammation and Mucus Plugging in Adult βENaC-Tg Mice by Ryan Brown, Donna M. Small, Declan F. Doherty, Leslie Holsinger, Robert Booth, Richard Williams, Rebecca J. Ingram, J. Stuart Elborn, Marcus A. Mall, Clifford C. Taggart, Sinéad Weldon

    Published 2021-01-01
    “…Bronchoalveolar lavage (BAL) fluid inflammatory cell counts were quantified, and lung tissue destruction and mucus obstruction were analysed histologically. …”
    Get full text
    Article
  4. 3124

    Associations between TGF-β1 Levels and Markers of Hemolysis, Inflammation, and Tissue Remodeling in Pediatric Sickle Cell Patients by Rayra P. Santiago, Magda O. S. Carvalho, Camylla V. B. Figueiredo, Luciana M. Fiuza, Rodrigo M. Oliveira, Sètondji C. M. A. Yahouédéhou, Valma M. L. Nascimento, Isa M. Lyra, Théo Araujo-Santos, Nívea F. Luz, Milena M. Aleluia, Caroline C. Guarda, Valéria M. Borges, Marilda S. Goncalves

    Published 2021-01-01
    “…Additionally, HbSC individuals with TGF-β1 levels above the median (≥47.80 ng/mL) presented increased leukocyte and platelet counts, as well as increased levels of triglycerides, VLDL-C, MMP-9, and TIMP-1, and decreased HDL-C. …”
    Get full text
    Article
  5. 3125

    Expression of PD-1 on CD4+ Tumor-Infiltrating Lymphocytes in Tumor Microenvironment Associated with Pathological Characteristics of Breast Cancer by Yan-Jie Zhao, Jian Zhang, Feng Shi, Zhi-Ping Hu, Jiang-Ping Wu, Guang-Jiang Wu, Rui-Bin Wang, Quan Zhou, Hong Chang, Ying-Nan Li, Qing-Kun Song

    Published 2018-01-01
    “…Counts of CD4+/PD-1+ tumor-infiltrating lymphocytes had a significant correlation with Ki-67 index that the correlation coefficient was 0.29 (p=0.001). …”
    Get full text
    Article
  6. 3126

    Research on multi-address time-based blockchain covert communication method by Dongyan HUANG, Kun LI

    Published 2023-02-01
    “…Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by different addresses.The content of the ciphertext fragment was represented by the block timestamp interval of the address.Then the interval of the blocks was read and counted by the receiver where these addresses were located.Finally, the ciphertext was restored by combination.In addition, in view of the lack of concealment measures in the time-based blockchain covert communication system, a method of adjusting the time interval of transaction initiation was proposed to reduce the probability of address specificity caused by covert communication behavior.The experimental results verify that the transmission rate of the proposed method is about n times higher than that of the time-based blockchain covert communication method when n addresses are involved.…”
    Get full text
    Article
  7. 3127

    Dynamic deployment algorithm for multi-controllers based on bidirectional matching in software defined networking by Tao HU, Jianhui ZHANG, Weigong KONG, Sen YANG, Lujia CAO

    Published 2018-01-01
    “…Aiming at the controller load imbalance problem in distributed SDN,a multi-controller dynamic deployment algorithm based on bidirectional matching was proposed.Through collecting hop counts,delay and flow information in the network periodically,match lists of switch and controller was built respectively.According to the principle of optimal queuing,switches and controllers were selected from two match lists for implementing bidirectional matching,and the relationship of matching with the help of simulated annealing algorithm was optimized,which achieved dynamic deployment for multi-controller in distributed network.Results show that,compared with the existing approaches,this algorithm can match the connections between switches and controllers reasonably,and reduce the queue delay of flow request effectively.Moreover,and the controller load balancing rate has increased by 17.9% at least.…”
    Get full text
    Article
  8. 3128

    Analysis of Nonlinear Characteristic and Performance Continuity Reliability of Rolling Bearing Vibration by Cheng Li, Xia Xintao, Ye Liang

    Published 2019-01-01
    “…Simultaneously, based on the maximum entropy principle and Poisson counting principle, the vibration performance continuity reliability model of the rolling bearing is established, and then the matching sequence of nonlinear characteristics and the vibration performance continuity reliability of the rolling bearing vibration are established. …”
    Get full text
    Article
  9. 3129

    The Report of Lightning in Himalayan Locale by Pitri Bhakta Adhikari

    Published 2023-01-01
    “…All these highlights impact different normal fiascos counting the lightning action. This report points at analyzing the varieties of lightning inside and over a long time from January 2011 to present. …”
    Get full text
    Article
  10. 3130

    Lightweight and Scalable Intrusion Trace Classification Using Interelement Dependency Models Suitable for Wireless Sensor Network Environment by Dae-Ki Kang

    Published 2013-07-01
    “…For efficient and lightweight counting of n -gram features without losing accuracy, we use a k -truncated generalized suffix tree ( k -TGST) for storing n -gram features. …”
    Get full text
    Article
  11. 3131

    Data-driven data transmission of the Internet of things based on sensing spectrum by Xuanheng LI, Yi SUN, Jie WANG, Haixia ZHANG

    Published 2019-06-01
    “…Facing the problem of spectrum shortage caused by the mass data,in order to share as a solution,how operators use the sensing spectrum reasonably to transmit data was studied.Considering the limitation of Internet of things(IoT) devices,the ultra-dense cognitive heterogeneous network architecture was designed,based on traffic demand and perception cost,an optimal access control and perception decision method was designed to maximize network utility.Considering the uncertainty of the perceived spectrum,the optimal programming scheme was modeled as a mixed integer stochastic optimization problem,and a data-driven probabilistic solution method based on statistical characteristics was proposed.In the case of unknown probability distribution of available bandwidth,data transmission requirements meeting various service requests were counted.…”
    Get full text
    Article
  12. 3132

    Research on Network Selection Algorithm Based on User Preference in Heterogeneous System by Cun Yang, Jihong Zhao, Shuyuan Zhao

    Published 2014-06-01
    “…Most network selection algorithms did not pay more attention to user preference for networks which was based on service requirements.For this circumstance,a new network selection algorithm based on user prefenence was proposed.The algorithm was fully considerd service reqirements,user prefernece and network performance.The AHP algorithm and distance analysis were used to calculate subjective and objective user preference weight respectively for different heterogeneous networks.Then the user preference weight for networks could be obtained dynamically on the basis of user strategy.The performance of each candidate network was counted,based on which the optimum network was selected.Simulation results show that the algorithm performs well in network selection and reduces the number of handoff times as the user moves through the network boundary frequently.…”
    Get full text
    Article
  13. 3133

    Risk assessing and privacy-preserving scheme for privacy leakage in APP by Xinyu WANG, Ben NIU, Fenghua LI, Kun HE

    Published 2019-05-01
    “…The APP in smartphone contain various third-party services.However,the service providers illegally read the user’s private information.To address this problem,a privacy risk assessing scheme called PRAS was proposed.Firstly,a model was built to assess the risk of privacy leakage,by counting all the permissions acquired by each service providers and considering the non-linear impact of the permissions combination on privacy leakage.Then,by analyzing the balance between service quality and privacy-preserving,an optimal model was used to minimized the risk of private information leakage,and a permission management method was given to protect the privacy information among APP.The experiment results show that PRAS reduces the risk of privacy leakage by an average of 18.5%.…”
    Get full text
    Article
  14. 3134

    THE RESEARCH OF USING «THE COST RECOVERY» METHOD IN THE COST MANAGEMENT by Y. Vorontsova, I. Barakhanova

    Published 2017-01-01
    “…They considered its integration with other methods, which were combined in different groups and can be used for task of direct counting as well as for optimization task. Those particular methods were selected to solve specific tasks, which special literature determines as tasks when «Cost recovery» method can be applied accordingly. …”
    Get full text
    Article
  15. 3135

    Compilation of the Test Load Spectrum of Wind Power Gearbox based on the Random Wind Speed Model by Xu Fang, Zhou Zhigang

    Published 2015-01-01
    “…In order to compile the load spectrum for dynamic characteristic and fatigue life test of wind turbine gear transmission system,the external random wind load is obtained on the basis of simulating reality wind speed and aerodynamics theory,and by using the rain- flow counting method and mathematical statistics method,the statistic and analysis of the input random wind load data is carried out. …”
    Get full text
    Article
  16. 3136

    Main ideas to consider in the elaboration of a new theoretical model of the clinical method. by Luis Alberto Corona Martínez

    Published 2006-12-01
    “…Such ideas are: the necessity of a total correspondence between the process method and its objective, the conception of the medical attention process as a decision-taking process, the necessity of highlighting the human dimension of the medical practice, and the convenience of counting with a synthetic representation of the clinical method that facilitates its learning and comprehension. …”
    Get full text
    Article
  17. 3137

    Sampling and Compilation Method of Load Spectrum of Passenger Car Transmission by Chen Dexin, Li Songsong, Shi Xinglei

    Published 2017-01-01
    “…To study the sampling and compilation method of load spectrum of passenger car transmission,taking a certain type of front-engine,front-wheel-drive passenger car transmission as an example,according to different road conditions,the road random load of this passenger car transmission is collected.According to the characteristics of the load,the amplitude cycle counting method is employed to complete the statistical treatment for various time dependent loads tested in the road test.The design load spectrum of the passenger car transmission is compiled.The sampling and compilation method of load spectrum of the passenger car transmission is established.The method can provide accurate design input conditions for passenger car transmission,and provide a reference for accurate fatigue life prediction and fatigue test.…”
    Get full text
    Article
  18. 3138

    Virtue Depends on Natural Law and Divine Commands by J. Caleb Clanton, Kraig Martin

    Published 2024-12-01
    “…The upshot of our argument, then, is this: what counts as a virtue ultimately depends upon the natural law <i>and</i> divine commands.…”
    Get full text
    Article
  19. 3139

    Talking about the problem: a content analysis of pre-search interviews by T.D. Wilson

    Published 2004-01-01
    “…TEXTStat, a free program, was used to produce frequency counts of the words used in the interview and to examine the context of those words. …”
    Get full text
    Article
  20. 3140

    Sparse-view Material Decomposition for Spectral X-ray CT using Neural Radiance Fields by Takumi Hotta, Tatsuya Yatagawa, Yutaka Ohtake, Toru Aoki

    Published 2025-02-01
    “… Photon-counting X-ray detectors, in contrast to conventional flat panel detectors, have the capability of distinguishing between photons with different energies, and have been leveraged for material decomposition tasks for materials with similar X-ray attenuation properties. …”
    Get full text
    Article