Showing 39,661 - 39,680 results of 54,749 for search '"internment"', query time: 0.18s Refine Results
  1. 39661
  2. 39662

    Validation of Fuscoporia (Hymenochaetales, Basidiomycota) ITS sequences and five new species based on multi-marker phylogenetic and morphological analyses by Yoonhee Cho, Dohye Kim, Yoongil Lee, Juhwan Jeong, Shahid Hussain, Young Woon Lim

    Published 2023-06-01
    “…The identities of 658 Fuscoporia GenBank internal transcribed spacer (ITS) sequences were assessed using ITS phylogeny, revealing 109 (16.6%) misidentified and 196 (29.8%) unspecified sequences. …”
    Get full text
    Article
  3. 39663

    Congenital Vitelline Band Causing Intestinal Obstruction in an Adult with a Double Inferior Vena Cava by Mihiri Wettasinghe, Kumari Pussepitiya, Bandula Samarasinghe, Nuwan Wickramasinghe

    Published 2016-01-01
    “…Left external iliac vein was in continuity with the left IVC. Left internal iliac vein was draining into the right IVC. …”
    Get full text
    Article
  4. 39664

    Effect of Polypropylene Fiber on Properties of Alkali-Activated Slag Mortar by Yangchen Xu, Haiming Chen, Pengju Wang

    Published 2020-01-01
    “…SEM results show that the bridging effect of PPF between AAS mortars can inhibit the generation and propagation of cracks, improve the internal microstructure, and enhance the performance of AAS mortar.…”
    Get full text
    Article
  5. 39665

    Pancreatic Cancer: Who Benefits from Curative Resection? by HG Beger, F Gansauge, G Leder

    Published 2002-01-01
    “…Patients with stage I or II disease according to the criteria of the International Union Against Cancer (UICC) should be considered for potentially curative surgery. …”
    Get full text
    Article
  6. 39666

    User authentication of industrial internet based on HHT transform of mouse behavior by Yigong ZHANG, Qian YI, Jian LI, Congbo LI, Aijun YIN, Shuping YI

    Published 2022-06-01
    “…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
    Get full text
    Article
  7. 39667

    Protective Role of rAAV-NDI1, Serotype 5, in an Acute MPTP Mouse Parkinson's Model by Jennifer Barber-Singh, Byoung Boo Seo, Akemi Matsuno-Yagi, Takao Yagi

    Published 2011-01-01
    “…We have recently shown that the non-proton-pumping, internal NADH-ubiquinone oxidoreductase (Ndi1) from Saccharomyces cerevisiae (baker's yeast) can be successfully inserted into the mitochondria of mice and rats, and the enzyme was found to be fully active. …”
    Get full text
    Article
  8. 39668

    Development of Assessment Tool to Measure Children’s Knowledge on Dengue Prevention Activities in Malaysia by H. Siti Nur Farhana, J. Noorlaile, K. Manimaran, S. Kamarul Zaman, A. Normawati, Albeny Joslyn Panting

    Published 2022-01-01
    “…Cronbach’ alpha test was used to assess the internal consistency of the items, and the test and retest reliability method was used to measure the consistency of the questionnaire. …”
    Get full text
    Article
  9. 39669

    Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network by Mayada Tarek, Eslam Hamouda, Sara El‐Metwally

    Published 2021-11-01
    “…The experimental results of unimodal‐Bio‐GAN using the CASIA Iris‐V3‐Internal database outperform the previous methods and its security efficiency is analysed using different attack types.…”
    Get full text
    Article
  10. 39670

    Brand communication of Russian state corporations: conceptual approaches and current state by D. Yu. Faikov, S. D. Faikova

    Published 2024-06-01
    “…Unfriendly actions against Russia taken by the “global North” predetermine the need not only to strengthen defense capability and economic sovereignty, but also to expand international cooperation with other states. Strong brands of state-owned corporations, which have well-known successes at the global level, may help solve these problems. …”
    Get full text
    Article
  11. 39671

    Supply or Demand, that is the Question: Decomposing Euro Area Inflation by Paolo Pasimeni

    Published 2022-12-01
    “…The fact that price pressure comes mainly from sectors with a high import content suggests that disruptions along international supply chains may play a key role. The paper then focuses on producer prices at the sectoral level and presents a methodology to decompose the rise in inflation between supply and demand impulses. …”
    Get full text
    Article
  12. 39672

    Green hydrogen in the iron and steel industry increases resilience against shocks in energy prices by Nicola Leuratti, Giacomo Marangoni, Laurent Drouet, Linda M Kamp, Jan Kwakkel

    Published 2025-01-01
    “…Geopolitical tensions and conflicts can disrupt energy markets, threatening international energy supply security and imposing financial stress on energy-intensive industries reliant on imported fossil fuels. …”
    Get full text
    Article
  13. 39673

    Graph-based two-level indicator system construction method for smart city information security risk assessment by Li Yang, Kai Zou, Yuxuan Zou

    Published 2024-08-01
    “…However, existing methods cannot effectively analyze internal and hierarchical relationships because of the excessive number of indicators. …”
    Get full text
    Article
  14. 39674

    Quantifying and Characterizing Phonetic Reduction in Italian Natural Speech by Loredana Schettino, Francesco Cutugno

    Published 2025-01-01
    “…We will describe some of the most frequent phonetic variation patterns that may be observed in the speech chain seen as a sequence of syllables, in relation to internal syllabic structure and lexical stress. The present study concerns speech data from the Italian section of the NOCANDO corpus. …”
    Get full text
    Article
  15. 39675

    Prospects for Collaborative Industrial Doctoral Education in Russia by V. A. Teslenko, R. M. Melnikov

    Published 2020-06-01
    “…The article proposes recommendations on the development of collaborative industrial doctoral education in Russian conditions considering international experience and provides a justification for the Russian high-tech companies’ demand for the competences of graduates of the collaborative doctoral programs. …”
    Get full text
    Article
  16. 39676

    Assessment of Pollution Trend of Oke Afa Canal Lagos, Nigeria by R. A. Olowu, O. O. Ayejuyo, G. O. Adewuyi, I. A. Adejoro, T. A. Akinbola, M. O. Osundiya, C. T. Onwordi

    Published 2010-01-01
    “…The parameters were compared with established international standard (APCELS). The canal water contained very high concentration of BOD (64.8±11.3 mg/L) and COD (107.8±22.3 mg/L) which would suggest the presence of a high level of organic load that result in the pollution of the canals. …”
    Get full text
    Article
  17. 39677

    Action Planning for Daily Mouth Care in Long-Term Care: The Brushing Up on Mouth Care Project by Mary E. McNally, Ruth Martin-Misener, Christopher C. L. Wyatt, Karen P. McNeil, Sandra J. Crowell, Debora C. Matthews, Joanne B. Clovis

    Published 2012-01-01
    “…Assessment involved exploration of internal and external factors influencing oral care in long-term care and included document review, focus groups and one-on-one interviews with end-users. …”
    Get full text
    Article
  18. 39678

    Access control scheme for medical data based on PBAC and IBE by Yi-ting ZHANG, Yu-chuan FU, Ming YANG, Jun-zhou LUO

    Published 2015-12-01
    “…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
    Get full text
    Article
  19. 39679

    Exploring the Relationship Between Residential Perceptions and Satisfaction: A Demographic Analysis in Wuhan, China by Mengyao Hong, Hongrui Li, Wei Wei, Jialing Chao, Junnan Xia

    Published 2025-01-01
    “…Previous research has shown that residents’ perceptions significantly influence their residential satisfaction. However, the internal relationships within these perceptions and their impact on satisfaction across different demographic groups remain underexplored. …”
    Get full text
    Article
  20. 39680

    Sustainable Energy Transitions: Overcoming Negative Externalities by U. Yе. Pysmenna, G. S. Trypolska

    Published 2020-08-01
    “…Using the Externality theory (Baumol, Oates), Sociotechnical transition theory (Geels), as well as Energy sustainability Trilemma Method for the evaluation of the sustainability of energy systems we argue that such externalities need to be treated (internalized, avoided) by special policy measures other than common (classical) ways which may cause slowing down of sustainability transitions and make extra barriers for them. …”
    Get full text
    Article