Suggested Topics within your search.
Suggested Topics within your search.
- History 5
- Risk management 5
- library 5
- Consumers 4
- Research 4
- Sociological aspects 4
- Sports 4
- Business enterprises 3
- Entrepreneurship 3
- Industrial management 3
- Information Science 3
- methods 3
- Biochemistry 2
- Chemistry, Clinical 2
- Damages 2
- Evaluation 2
- Health and Fitness 2
- Internet 2
- Libraries 2
- Libraries and electronic publishing 2
- Management 2
- Popular music 2
- Soldiers 2
- World War, 1914-1918 2
- ART / Film & Video 1
- Access control 1
- Air conditioning 1
- Anesthesia 1
- Anesthesiology 1
- Applied linguistics 1
-
6181
-
6182
-
6183
-
6184
First versus second drop of capillary blood for monitoring blood glucose: a meta-analysis and systematic review
Published 2024-05-01“…Material and methods Two authors searched PubMed, ClinicalTrials, Cochrane Library, Clinical Evidence, EMBASE, China National Knowledge Infrastructure (CNKI), Wanfang and Weipu databases for relevant literature about the comparison of blood glucose values of the first capillary blood from the establishment of each database until November 10, 2023. …”
Get full text
Article -
6185
-
6186
Spatiotemporal simulation of sustainable development based on ecosystem services under climate change.
Published 2025-01-01Get full text
Article -
6187
Accelerating antimicrobial peptide design: Leveraging deep learning for rapid discovery.
Published 2024-01-01Get full text
Article -
6188
-
6189
Advances in the application of human-machine collaboration in healthcare: insights from China
Published 2025-02-01“…We use the subject words “Human–machine collaboration” OR “Human-Computer Interaction” OR “HCI” AND “chronic disease” OR “Health management” OR ”Precision medicine “were searched for CNKI, Wanfang Data, VIP, CBM, PubMed, Web of science, Embase, Cochrane Library and other Chinese and English databases to identify all relevant studies and compare their results, and finally include 68 relevant literature articles, we identified the broad application of HCI in five main areas: disease screening and treatment, health management, medical education, traditional medicine, and the integration and processing of medical data. …”
Get full text
Article -
6190
-
6191
Implementation of Islamic Education Values in Building Students' Religious Character through an Affective Approach Based on the Qur'an
Published 2024-06-01“…Design/method/approach – This research method was descriptive qualitative, as library research. Data sources were books, teaching materials, journals, and other relevant information. …”
Get full text
Article -
6192
-
6193
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
6194
-
6195
Prevalence and influence factors of hepatic encephalopathy after transjugular intrahepatic portosystemic shunt: a Meta-analysis
Published 2025-01-01“…Objective To systematically evaluate the current status of hepatic encephalopathy (HE) and its influencing factors in patients after transjugular intrahepatic portosystemic shunt (TIPS).Methods Cochrane Library, PubMed, Embase, Web of Science, CINAHL , CNKI, VIP , CBM, WanFang database were searched from inception to October 20, 2024. …”
Get full text
Article -
6196
Genomic assessment of targets implicated in Rhipicephalus microplus acaricide resistance.
Published 2024-01-01Get full text
Article -
6197
-
6198
-
6199
-
6200