Showing 1,001 - 1,020 results of 2,515 for search '"surveillance"', query time: 0.06s Refine Results
  1. 1001

    La discrétion du volcan Katla by Elisabeth Bernard

    Published 2022-10-01
    “…Looming over the village, the subglacial volcano Katla has worried Iceland’s surveillance institutions for years, as they attempt to ready themselves for the next eruption, whose potential for destruction was forecast long ago. …”
    Get full text
    Article
  2. 1002

    GENETIC PREDISPOSITION TO HEMATOLOGIC MALIGNANCIES IN CHILDHOOD AND ADOLESCENCE by Francesco Fabozzi, Angela Mastronuzzi

    Published 2023-04-01
    “…The recognition of a germline mutation in a patient affected by a hematologic malignancy allows for a tailored treatment approach in order to minimize toxicities, and informs the donor selection for hematopoietic stem cell transplantation as well as the comorbidities evaluation and surveillance strategies. This review provides an overview of germline mutations that predispose to hematologic malignancies, focusing on those most common during childhood and adolescence, based on the new International Consensus Classification of Myeloid and Lymphoid Neoplasms. …”
    Get full text
    Article
  3. 1003
  4. 1004
  5. 1005
  6. 1006

    Global prevalence of 4 neglected foodborne trematodes targeted for control by WHO: A scoping review to highlight the gaps. by Rachel Tidman, Kaushi S T Kanankege, Mathieu Bangert, Bernadette Abela-Ridder

    Published 2023-03-01
    “…<h4>Background</h4>Foodborne trematodiases (FBTs) are a group of trematodes targeted for control as part of the World Health Organization (WHO) road map for neglected tropical diseases from 2021 to 2030. Disease mapping; surveillance; and capacity, awareness, and advocacy building are critical to reach the 2030 targets. …”
    Get full text
    Article
  7. 1007

    Genomic analysis of Enterobacter cloacae complex from Southern Thailand reveals insights into multidrug resistance genotypes and genetic diversity by Thunchanok Yaikhan, Kamonnut Singkhamanan, Pawarisa Luenglusontigit, Arnon Chukamnerd, Natakorn Nokchan, Nutwadee Chintakovid, Sarunyou Chusri, Rattanaruji Pomwised, Monwadee Wonglapsuwan, Kittinun Leetanaporn, Surasak Sangkhathat, Komwit Surachat

    Published 2025-02-01
    “…These findings highlight the need for stringent infection control measures to prevent similar outbreaks and emphasize the importance of effective surveillance and management strategies to address ECC-related challenges.…”
    Get full text
    Article
  8. 1008
  9. 1009
  10. 1010
  11. 1011

    Sistem Object Tracking pada Quadcopter Menggunakan Segmentasi Citra dengan Deteksi Warna HSV dan Metode Regresi Linier Berbasis Raspberry Pi by Fahmi Erza, Hurriyatul Fitriyah, Eko Setiawan

    Published 2022-12-01
    “…Therefore, developing systems that allow devices to perform surveillance tasks such as detecting and tracking moving objects will allow more sophisticated tasks to be applied to robots in the future. …”
    Get full text
    Article
  12. 1012

    Using Sequence Mining to Predict Complex Systems: A Case Study in Influenza Epidemics by Theyazn H. H. Aldhyani, Manish R. Joshi, Shahab A. AlMaaytah, Ahmed Abdullah Alqarni, Nizar Alsharif

    Published 2021-01-01
    “…Such subtypes of influenza have the potential to cause devastating epidemics. Thus, enhancing surveillance systems for the purpose of detecting influenza epidemics in an early stage can quicken response times and save millions of lives. …”
    Get full text
    Article
  13. 1013
  14. 1014
  15. 1015

    Utilizing A Multi-Stage Transition Model for Analysing Child Stunting in Two Urban Slum Settlements of Nairobi: A Longitudinal Analysis, 2011-2014. by Oduro, Michael S., IddiI, Samuel, Asiedu, Louis, Asiki, Gershim, Kadengye, DamazoT.

    Published 2024
    “…Methods This study used data collected between 2010 and 2014 from the Nairobi Urban and Demographic Surveillance System (NUHDSS) and a vaccination study nested within the surveillance system. …”
    Get full text
    Article
  16. 1016
  17. 1017

    Paper-work: what module guides have to say about assessment practices by Judith Enriquez

    Published 2020-09-01
    “…It bears witness to the past and persistent norms and standards that are shaped by documents, paper-work, control, compliance and surveillance and less by pedagogical and student engagement. …”
    Get full text
    Article
  18. 1018

    Le travail émotionnel des adolescents face au web affectif. L’exemple de la réception d’images violentes, sexuelles et haineuses by Sophie Jehel, Serge Proulx

    Published 2020-05-01
    “…Our analysis relied on a threefold theoretical framework: the “digital labour” hypothesis, understood as putting Internet users to work; the “affective web” which stimulates this work by capturing attention and calculation of affects; and finally, the dimension of “panoptic surveillance” by making the images visible, which increases emotional tension. …”
    Get full text
    Article
  19. 1019

    A transcriptional profile of aging in the human kidney. by Graham E J Rodwell, Rebecca Sonu, Jacob M Zahn, James Lund, Julie Wilhelmy, Lingli Wang, Wenzhong Xiao, Michael Mindrinos, Emily Crane, Eran Segal, Bryan D Myers, James D Brooks, Ronald W Davis, John Higgins, Art B Owen, Stuart K Kim

    Published 2004-12-01
    “…Some of the genes whose transcripts increase in abundance with age are known to be specifically expressed in immune cells, suggesting that immune surveillance or inflammation increases with age. The age-regulated genes show a similar aging profile in the cortex and the medulla, suggesting a common underlying mechanism for aging. …”
    Get full text
    Article
  20. 1020

    Review of Blockchain integrated WSN by Samira Torabi

    Published 2023-03-01
    “…Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. when applying the WSN in the real world we have to face many challenges such as security, storage due to its centralized server/client models. …”
    Get full text
    Article