Suggested Topics within your search.
Suggested Topics within your search.
- Law and legislation 6
- Tourism 6
- History 5
- Internal medicine 5
- Moral and ethical aspects 5
- Economic aspects 4
- Economic development 4
- Standards 4
- Agriculture 3
- Children 3
- Congresses 3
- Cultural property 3
- Education 3
- English language 3
- Financial statements 3
- International economic relations 3
- International relations 3
- Legal ethics 3
- Legal status, laws, etc 3
- Management 3
- Pediatrics 3
- Politics and government 3
- Protection 3
- Social conditions 3
- Academic writing 2
- Application software 2
- Biology 2
- Business enterprises 2
- Business ethics 2
- Business writing 2
-
39661
Spontaneous Recovery of Paraplegia in a Polytrauma Patient following Spinal Cord Ischemia due to Type B Traumatic Aortic Dissection
Published 2023-01-01“…It is caused by a tear in the internal vascular wall (intimal layer and middle layer), which results in bleeding between the layers and causes abrupt and excruciating pain. …”
Get full text
Article -
39662
Validation of Fuscoporia (Hymenochaetales, Basidiomycota) ITS sequences and five new species based on multi-marker phylogenetic and morphological analyses
Published 2023-06-01“…The identities of 658 Fuscoporia GenBank internal transcribed spacer (ITS) sequences were assessed using ITS phylogeny, revealing 109 (16.6%) misidentified and 196 (29.8%) unspecified sequences. …”
Get full text
Article -
39663
Congenital Vitelline Band Causing Intestinal Obstruction in an Adult with a Double Inferior Vena Cava
Published 2016-01-01“…Left external iliac vein was in continuity with the left IVC. Left internal iliac vein was draining into the right IVC. …”
Get full text
Article -
39664
Effect of Polypropylene Fiber on Properties of Alkali-Activated Slag Mortar
Published 2020-01-01“…SEM results show that the bridging effect of PPF between AAS mortars can inhibit the generation and propagation of cracks, improve the internal microstructure, and enhance the performance of AAS mortar.…”
Get full text
Article -
39665
Pancreatic Cancer: Who Benefits from Curative Resection?
Published 2002-01-01“…Patients with stage I or II disease according to the criteria of the International Union Against Cancer (UICC) should be considered for potentially curative surgery. …”
Get full text
Article -
39666
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
39667
Protective Role of rAAV-NDI1, Serotype 5, in an Acute MPTP Mouse Parkinson's Model
Published 2011-01-01“…We have recently shown that the non-proton-pumping, internal NADH-ubiquinone oxidoreductase (Ndi1) from Saccharomyces cerevisiae (baker's yeast) can be successfully inserted into the mitochondria of mice and rats, and the enzyme was found to be fully active. …”
Get full text
Article -
39668
Development of Assessment Tool to Measure Children’s Knowledge on Dengue Prevention Activities in Malaysia
Published 2022-01-01“…Cronbach’ alpha test was used to assess the internal consistency of the items, and the test and retest reliability method was used to measure the consistency of the questionnaire. …”
Get full text
Article -
39669
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01“…The experimental results of unimodal‐Bio‐GAN using the CASIA Iris‐V3‐Internal database outperform the previous methods and its security efficiency is analysed using different attack types.…”
Get full text
Article -
39670
Brand communication of Russian state corporations: conceptual approaches and current state
Published 2024-06-01“…Unfriendly actions against Russia taken by the “global North” predetermine the need not only to strengthen defense capability and economic sovereignty, but also to expand international cooperation with other states. Strong brands of state-owned corporations, which have well-known successes at the global level, may help solve these problems. …”
Get full text
Article -
39671
Supply or Demand, that is the Question: Decomposing Euro Area Inflation
Published 2022-12-01“…The fact that price pressure comes mainly from sectors with a high import content suggests that disruptions along international supply chains may play a key role. The paper then focuses on producer prices at the sectoral level and presents a methodology to decompose the rise in inflation between supply and demand impulses. …”
Get full text
Article -
39672
Green hydrogen in the iron and steel industry increases resilience against shocks in energy prices
Published 2025-01-01“…Geopolitical tensions and conflicts can disrupt energy markets, threatening international energy supply security and imposing financial stress on energy-intensive industries reliant on imported fossil fuels. …”
Get full text
Article -
39673
Graph-based two-level indicator system construction method for smart city information security risk assessment
Published 2024-08-01“…However, existing methods cannot effectively analyze internal and hierarchical relationships because of the excessive number of indicators. …”
Get full text
Article -
39674
Quantifying and Characterizing Phonetic Reduction in Italian Natural Speech
Published 2025-01-01“…We will describe some of the most frequent phonetic variation patterns that may be observed in the speech chain seen as a sequence of syllables, in relation to internal syllabic structure and lexical stress. The present study concerns speech data from the Italian section of the NOCANDO corpus. …”
Get full text
Article -
39675
Prospects for Collaborative Industrial Doctoral Education in Russia
Published 2020-06-01“…The article proposes recommendations on the development of collaborative industrial doctoral education in Russian conditions considering international experience and provides a justification for the Russian high-tech companies’ demand for the competences of graduates of the collaborative doctoral programs. …”
Get full text
Article -
39676
Assessment of Pollution Trend of Oke Afa Canal Lagos, Nigeria
Published 2010-01-01“…The parameters were compared with established international standard (APCELS). The canal water contained very high concentration of BOD (64.8±11.3 mg/L) and COD (107.8±22.3 mg/L) which would suggest the presence of a high level of organic load that result in the pollution of the canals. …”
Get full text
Article -
39677
Action Planning for Daily Mouth Care in Long-Term Care: The Brushing Up on Mouth Care Project
Published 2012-01-01“…Assessment involved exploration of internal and external factors influencing oral care in long-term care and included document review, focus groups and one-on-one interviews with end-users. …”
Get full text
Article -
39678
Access control scheme for medical data based on PBAC and IBE
Published 2015-12-01“…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
Get full text
Article -
39679
Exploring the Relationship Between Residential Perceptions and Satisfaction: A Demographic Analysis in Wuhan, China
Published 2025-01-01“…Previous research has shown that residents’ perceptions significantly influence their residential satisfaction. However, the internal relationships within these perceptions and their impact on satisfaction across different demographic groups remain underexplored. …”
Get full text
Article -
39680
Sustainable Energy Transitions: Overcoming Negative Externalities
Published 2020-08-01“…Using the Externality theory (Baumol, Oates), Sociotechnical transition theory (Geels), as well as Energy sustainability Trilemma Method for the evaluation of the sustainability of energy systems we argue that such externalities need to be treated (internalized, avoided) by special policy measures other than common (classical) ways which may cause slowing down of sustainability transitions and make extra barriers for them. …”
Get full text
Article