Suggested Topics within your search.
Suggested Topics within your search.
- Law 6
- Management 6
- Nursing 6
- methods 6
- Nursing Assessment 5
- Nursing Care 5
- Philosophy 5
- Information technology 4
- Surgical nursing 4
- Anesthesia 3
- Automobiles 3
- Economic conditions 3
- Economic development 3
- Electric power systems 3
- Electronics 3
- Human-computer interaction 3
- Jurisprudence 3
- Management information systems 3
- Microbiology 3
- Nervous System 3
- Neuroanatomy 3
- Pharmaceutical Preparations 3
- Physiology 3
- Politics and government 3
- Telecommunication 3
- administration & dosage 3
- physiology 3
- Anatomy 2
- Cardiovascular system 2
- Cloud computing 2
-
37741
Blastomycosis of the scrotum: Not a fun guy
Published 2025-01-01“…These can include genitourinary system infections which may manifest as ulcerative, draining skin lesions. …”
Get full text
Article -
37742
Differential privacy protection technology and its application in big data environment
Published 2019-10-01“…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
Get full text
Article -
37743
Flow Measurements and Flow Analysis in the Exit Region of a Radial Turbine
Published 1997-01-01“…Three-dimensional flow measurements using LDV system were obtained in the exit region of a radial inflow turbine at an off-design operating condition. …”
Get full text
Article -
37744
RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations
Published 2009-01-01“…Our results show that in comparison to the raw correlations, the affinity matrices highlight the dominant factors of the system, and the partial correlation matrices contain more information. …”
Get full text
Article -
37745
Global stability of a network-based SIS epidemic model with a general nonlinear incidence rate
Published 2016-04-01“…Furthermore, by applying an iteration scheme and the theory of cooperative system respectively, we obtain sufficient conditions under which the endemic equilibrium is globally asymptotically stable. …”
Get full text
Article -
37746
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. …”
Get full text
Article -
37747
Toward a Model for Marking up Non-SI Units and Measurements
Published 2019-06-01“…All of these elements and attributes will be included in the TEI P5 Guidelines, and they are especially useful when encoding units that are not based on the decimal system. Though this paper offers example encodings based on a Japanese historical source, the Engi-Shiki, this model is also applicable to the markup of units used for measurement within various cultural spheres other than Japan.…”
Get full text
Article -
37748
COVID-19: Malaysia's fight against this deadly virus
Published 2021-06-01“…A record toll of new cases and fatalities for consecutive weeks has pushed Malaysia's total cases to a soaring 500,000 confirmed cases with 2300 deaths – the third highest in Southeast Asia behind Indonesia and the Philippines. The healthcare system in Malaysia is currently under heavy pressure to control the disease as the number of confirmed cases is rising exponentially. …”
Get full text
Article -
37749
Study on Cumulative Damage Law of Stainless Steel-Reinforced Concrete Columns under Step Impact Loading
Published 2019-01-01“…In this study, an ultrahigh drop hammer impact test system was adopted for multiple horizontal impact tests on stainless steel-reinforced concrete columns and ordinary-reinforced concrete columns with the same longitudinal reinforcement diameter. …”
Get full text
Article -
37750
Lessons from Cancer Immunoediting in Cutaneous Melanoma
Published 2012-01-01“…We will revisit the dual role of the immune system in controlling and enabling tumor progression, known as cancer immunoediting. …”
Get full text
Article -
37751
Traffic Accident Prediction Based on LSTM-GBRT Model
Published 2020-01-01“…In order to provide traffic management departments with more accurate forecast data, it can be applied in the traffic management system to help make scientific decisions. This paper establishes a traffic accident prediction model based on LSTM-GBRT (long short-term memory, gradient boosted regression trees) and predicts traffic accident safety level indicators by training traffic accident-related data. …”
Get full text
Article -
37752
Three-Dimensional Seepage Field Inversion Analysis and Seepage Control Effect Evaluation of Shuidishan Reservoir
Published 2022-01-01“…Moderate permeable joint zones occur at the right dam abutment of the Shuidishan reservoir,which indicates a risk of seepage damage at the right dam abutment and its downstream.To reasonably evaluate the effect of reservoir seepage control measures,we build an overall three-dimensional (3D) seepage model to simulate the stable seepage in a natural state and the operation period.The permeability coefficient of the rock layer is optimized,and the seepage field characteristics of the reservoir area are analyzed.The results show that the downstream uplift pressure of the dam foundation is significantly reduced under the combined effect of the water-blocking curtain and the depressurization of drainage holes.Moreover,the curtain grouting lowers the local groundwater level within the right dam abutment,which inhibits the leakage of the joint zones to a certain extent.The overall seepage discharge of the reservoir is relatively small,which indicates that the layout of the water prevention and drainage system of the current project is acceptable,and thus the leakage of the joint zones at the right dam-abutment is effectively prevented.…”
Get full text
Article -
37753
Research and construction of new digital foundation for the fusion between IPv6 and 5G
Published 2024-11-01“…Based on the current situation of the campus network of Nankai University, new generation information network technologies such as IPv6 and 5G were studied, a new basic network integrating Wi-Fi campus network and 5G private network based on IPv6 protocol, IPv6 adaptation and application pilot deployment of the information innovation platform was built, a new digital foundation integrating IPv6 and 5G for plug and play against IPv6 was carried out and constructed, a mature cloud network fusion solution for the deployment of smart campus business system and a new basic network environment and trusted computing resources for the training, technology research and innovation of professionals in the next generation Internet related disciplines were provided, and the digital transformation of university education was enabled.…”
Get full text
Article -
37754
Research on security of mobile payment for commercial bank
Published 2014-11-01“…There is no doubt that mobile payment is the spotlight in Internet finance now.Although users can enjoy quick and convenient services,they have to face with more severe security problems at the same time:the attack incidents,such as cellphone Trojan and privacy leaks emerge endlessly.Lots of viruses which are designed for attacking financial payments can steal users’ personal information including account,password and verification code in the proceedings of remote payment and near field communication.Security issues have already seriously impeded the further development of the mobile payment market.To solve the above problems,discusses the security issues in mobile terminals,payments,network and interactive logic of banking business from financial institutions’ perspective was discussed systematically.In addition,current status of relevant security key technologies are summarized from academic research community and industry fields.Finally,based on related research achievements,the design of system architecture and suggestions for mobile payment security are proposed,which can guide the future development of commercial bank.…”
Get full text
Article -
37755
Finite-Time Control for Attitude Tracking Maneuver of Rigid Satellite
Published 2014-01-01“…It is proved that the closed-loop attitude tracking system is finite-time stable. The tracking errors of the attitude and the angular velocity are asymptotically stabilized. …”
Get full text
Article -
37756
Cognitive Phenotypes, Brain Morphometry and the Detection of Cognitive Decline in Preclinical AD
Published 2009-01-01Get full text
Article -
37757
BASIS ETIKA LINGKUNGAN HIDUP MASYARAKAT TRADISIONAL MADURA
Published 2018-06-01“…The Maduranese's traditional society belief system to nature seems more syncretic than the tradition of the people in Java Island.…”
Get full text
Article -
37758
Cognitive flexibility and sociality in Guinea baboons (Papio papio).
Published 2024-01-01“…The dominance rank and social network were inferred from their free access to the computer test system on which the cognitive task was presented. …”
Get full text
Article -
37759
Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid
Published 2016-01-01“…And the sensing and communication device must be after equal parameter simulation environment under strict evaluation and verification can be put to use in actual production operation system. In this paper, we analyze the application of wireless sensor network in smart grid and propose the test method of the interaction between WSN and smart grid.…”
Get full text
Article -
37760
Behaviors and Numerical Simulations of Malaria Dynamic Models with Transgenic Mosquitoes
Published 2014-01-01“…This paper investigates two methods of releasing transgenic mosquitoes and proposes two epidemic models involving malaria patients, anopheles, wild mosquitoes, and transgenic mosquitoes based on system of continuous differential equations. A basic reproduction number R0 is defined for the models and it serves as a threshold parameter that predicts whether malaria will spread. …”
Get full text
Article