Showing 59,541 - 59,560 results of 72,708 for search '"system"', query time: 0.31s Refine Results
  1. 59541
  2. 59542
  3. 59543
  4. 59544
  5. 59545
  6. 59546
  7. 59547
  8. 59548
  9. 59549
  10. 59550
  11. 59551
  12. 59552
  13. 59553

    Exploring the genomic and antimicrobial resistance tapestry: comparative insights into Salmonella enterica serotypes Agona, Braenderup, Muenchen, and Panama in Latin American surfa... by Zhao Chen, Enrique J. Delgado Suárez, Raquel R. Bonelli, Celso J. B. Oliveira, Andrea I. Moreno-Switt, Aiko D. Adell, Angélica Reyes-Jara, Christopher J. Grim, Marc W. Allard, Sandra M. Tallent, Eric W. Brown, Rebecca L. Bell, Magaly Toro, Jianghong Meng

    Published 2025-02-01
    “…ABSTRACT Surface waters function as ecological niches where Salmonella enterica can persist and disseminate to fresh produce production systems. We examined the genomic characteristics of S. enterica serotypes Agona (n = 86), Braenderup (n = 47), Muenchen (n = 53), and Panama (n = 69) isolates from surface waters in Chile, Mexico, and Brazil between 2019 and 2022. …”
    Get full text
    Article
  14. 59554
  15. 59555
  16. 59556

    Hemorrhagic Lacrimation and Epistaxis in Acute Hemorrhagic Edema of Infancy by Shireen Mreish, Hossam Al-Tatari

    Published 2016-01-01
    “…Despite its worrisome presentation, it carries good prognosis with rarely reported systemic involvement. Management of these cases has been an area of debate with majority of physicians adopting conservative modalities. …”
    Get full text
    Article
  17. 59557

    Molecular imaging of viral pathogenesis and opportunities for the future by Brianna Kelly, Jeanette E. Boudreau, Steven Beyea, Kimberly Brewer

    Published 2025-01-01
    “…Since tools to study viral pathogenesis longitudinally and systemically are limited, molecular imaging is an attractive and largely unexplored tool. …”
    Get full text
    Article
  18. 59558

    Research prospects of user information detection from encrypted traffic of mobile devices by Tengfei ZHANG, Shunzheng YU

    Published 2021-02-01
    “…Encrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods, and evaluation systems involved in these user information detection were analyzed and summarized.The problems in the existing projects were summarized, as well as the future research directions and challenges.…”
    Get full text
    Article
  19. 59559

    Research on intrusion detection algorithm in wireless network based on Bayes game model by CHEN Hang1, TAO Jun1

    Published 2010-01-01
    “…Bayes game theory was used to research parameter adjustment problems in wireless network intrusion detec-tion.Intrusion detection game model was designed,time interval adjust algorithm TSMA-BG and parameter correction algorithm DPMA were also designed according to the perfect equilibrium in game modeling.Simulation results show that intrusion detection systems can effectively use these algorithms to detect intrusion behavior that have been changed.…”
    Get full text
    Article
  20. 59560

    Linearization from Complex Lie Point Transformations by Sajid Ali, M. Safdar, Asghar Qadir

    Published 2014-01-01
    “…Complex Lie point transformations are used to linearize a class of systems of second order ordinary differential equations (ODEs) which have Lie algebras of maximum dimension d, with d≤4. …”
    Get full text
    Article