Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
3801
A collaborative network analysis for the interpretation of transcriptomics data in Huntington’s disease
Published 2025-01-01“…Taking this one step further, we hypothesized that combining and analyzing the results from multiple network-based methods could provide data-driven hypotheses of pathogenic mechanisms from multiple perspectives. …”
Get full text
Article -
3802
Cryptogenic Multifocal Ulcerous Stenosing Enteritis: A Review of the Literature
Published 2013-01-01“…Cryptogenic multifocal ulcerous stenosing enteritis (CMUSE) is an extremely rare illness characterised by chronic or relapsing subileus status resulting from multiple small intestinal fibrous strictures and multiple shallow ulcers of the small bowel. …”
Get full text
Article -
3803
Solitary Extramedullary Plasmacytoma of the Thyroid Gland
Published 2012-01-01“…The prognosis is favorable compared to solitary bone plasmacytomas or multiple myeloma.…”
Get full text
Article -
3804
A digital signature scheme based on shared key in intelligent terminal
Published 2017-02-01“…In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.…”
Get full text
Article -
3805
A Giant Pseudoaneurysm of the Forearm as Unusual Complication of Bacterial Endocarditis
Published 2013-01-01“…Surgical intervention with the removal of multiple, sterile clots from the hematoma was performed, and the multiple lacerations of the artery detected were corrected. …”
Get full text
Article -
3806
The Role of Microglia and Matrix Metalloproteinases Involvement in Neuroinflammation and Gliomas
Published 2013-01-01“…The induction of expression, suppression, and multiple pathways of function of MMPs in these scenarios will also be discussed. …”
Get full text
Article -
3807
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01“…The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential forgery.A novel anonymous signature scheme was proposed that enforced the security level to Model3 security and reduced the computational cost,which only needed two multiple calculations in G in signing phase and n+1 bilinear pairing operators in verifying algorithm.…”
Get full text
Article -
3808
A new method for detecting mixed Mycobacterium tuberculosis infection and reconstructing constituent strains provides insights into transmission
Published 2025-01-01“…Abstract Background Mixed infection with multiple strains of the same pathogen in a single host can present clinical and analytical challenges. …”
Get full text
Article -
3809
A Novel Generic Autonomous Synchronization Method for Microgrids
Published 2025-01-01“…The method enables seamless synchronization and reconnection across multiple microgrid operating scenarios without relying on communication infrastructure or phase-locked loops (PLLs). …”
Get full text
Article -
3810
Advanced Transition Preemption Strategy for Signalized Intersections near Highway-Rail Grade Crossings with Dual Tracks
Published 2022-01-01“…The new TPS algorithm is designed for corridors with multiple HGRCs that have dual tracks. An urban highway corridor with multiple HRGCs in Lincoln, NE, was selected as the study corridor. …”
Get full text
Article -
3811
Correlation of Unconfined Compressive Strength (UCS) with Compaction Characteristics of Soils in Burayu Town
Published 2022-01-01“…After further emphasis, the equation developed using multiple linear regression (UCS = −3105 + 1625 MDD + 40.9 OMC, R2 = 0.83) which was chosen as a prediction equation. …”
Get full text
Article -
3812
“Pharmacological” analysis of atrial fibrillation maintenance mechanism: reentry, wavelets, or focal?
Published 2025-01-01“…Yet, a single focal source and multiple focal sources are plausible as the primary mechanism of AF maintenance prior drug administration. …”
Get full text
Article -
3813
FDA-MIMO Radar Rapid Target Localization via Reconstructed Reduce Dimension Rooting
Published 2025-01-01“…Frequency diversity array–multiple-input multiple-output (FDA-MIMO) radar realizes an angle- and range-dependent system model by adopting a slight frequency offset between adjacent transmitter sensors, thereby enabling potential target localization. …”
Get full text
Article -
3814
Dominance-Partitioned Subgraph Matching on Large RDF Graph
Published 2020-01-01“…Firstly, a dominance-connected pattern graph is extracted from a pattern graph to construct a dominance-partitioned pattern hypergraph, which divides a pattern graph as multiple fish-shaped pattern subgraphs. Secondly, a dominance-driven spectrum clustering strategy is used to gather the pattern subgraphs into multiple clusters. …”
Get full text
Article -
3815
Bearing Fault Diagnosis Method Based on Multidomain Heterogeneous Information Entropy Fusion and Model Self-Optimisation
Published 2022-01-01“…To overcome these limitations, we proposed a multiple domain and heterogeneous information entropy fusion model based on an optimisation of bearing fault diagnosis. …”
Get full text
Article -
3816
Latency Improvement Strategies for Reliability-Aware Scheduling in Industrial Wireless Sensor Networks
Published 2015-10-01“…Combining the novel strategies with multiple sinks, multiple channels, and the introduced optimal bound, we could through simulations verify latency improvements by almost an order of magnitude, reducing the TDMA superframe execution times from tens of seconds to seconds only, which allows for a utilization of SchedEx for many time-critical control applications.…”
Get full text
Article -
3817
Smartphone Use, Experience of Learning Environment, and Academic Performance among University Students: A Descriptive Appraisal
Published 2022-01-01“…In our contemporary digital society, the smartphone is at the center of a powerful technological revolution affecting multiple domains. In the context of higher learning, the use of smartphones among students has been an area of interest. …”
Get full text
Article -
3818
Low-Complexity Transmit Antenna Selection and Beamforming for Large-Scale MIMO Communications
Published 2014-01-01“…Transmit antenna selection plays an important role in large-scale multiple-input multiple-output (MIMO) communications, but optimal large-scale MIMO antenna selection is a technical challenge. …”
Get full text
Article -
3819
Channel estimation for double IRS-assisted millimeter wave MIMO systems based on tensor decomposition and manifold optimization
Published 2024-12-01“…The issue of channel estimation for a double intelligent reflecting surface (IRS) assisted millimeter wave multiple-input multiple-output (MIMO) system was addressed and a channel estimation scheme based on tensor decomposition and manifold optimization was proposed. …”
Get full text
Article -
3820
ANALIZĂ DE CONȚINUT A ARIILOR STRATEGICE DE SECURITATE CIBERNETICĂ – STATELE UNITE ALE AMERICII, MAREA BRITANIE, SPANIA ȘI ROMÂNIA (CONTENT ANALYSIS OF STRATEGIC CYBER SECURITY FOC...
Published 2023-01-01“…Taking into consideration that cybersecurity is not only a technical matter, multiple strategic areas are needed to be addressed. …”
Get full text
Article