Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
57961
Engineering of l-threonine and l-proline biosensors by directed evolution of transcriptional regulator SerR and application for high-throughput screening
Published 2025-01-01“…The development of efficient high-throughput screening technologies utilizing biosensors is essential for the rapid identification of high-performance amino acid producers. …”
Get full text
Article -
57962
-
57963
-
57964
Analisis dan Perbaikan Proses Bisnis Sistem Terintegrasi Pembayaran Uang Kuliah dengan Metode Business Process Improvement (BPI) pada Universitas X
Published 2023-04-01“…Abstract Over the past few years, the role of technology has grown rapidly. The implementation of the Integrated Tuition Payment System has helped the integrated campus management. …”
Get full text
Article -
57965
-
57966
The Prevalence of Star-forming Clumps as a Function of Environmental Overdensity in Local Galaxies
Published 2025-01-01Get full text
Article -
57967
Deciphering the Transcriptional Metabolic Profile of Adipose-Derived Stem Cells During Osteogenic Differentiation and Epigenetic Drug Treatment
Published 2025-01-01“…In this study, we employed the NanoString nCounter technology, an advanced multiplexed digital counting method of RNA molecules, to comprehensively characterize differentially expressed transcripts involved in metabolic pathways at distinct time points in osteogenically differentiating ASCs treated with or without the pan-DNMT inhibitor RG108. …”
Get full text
Article -
57968
Revealing the Neuroimaging Mechanism of Acupuncture for Poststroke Aphasia: A Systematic Review
Published 2022-01-01“…Acupuncture has been proven to have a beneficial effect on improving speech functions in repetition, oral speech, reading, comprehension, and writing ability. Neuroimaging technology provides a visualized way to explore cerebral neural activity, which helps reveal the therapeutic effect of acupuncture therapy. …”
Get full text
Article -
57969
-
57970
-
57971
-
57972
The Influence of the Cu-Al<sub>2</sub>O<sub>3</sub> Ratio of the Receiving Tube in a 50 MW Hybrid Solar Plant
Published 2025-01-01“…Direct steam generation (DSG) is a promising technology for introducing solar energy into industrial applications, yet it still faces significant challenges. …”
Get full text
Article -
57973
Development of a Recombinant Omicron BA.1 Subunit Vaccine Candidate in Pichia pastoris
Published 2025-01-01“…The RBD‐Omicron‐based vaccine candidate developed in this study is suitable for technology transfer and transition into the clinic.…”
Get full text
Article -
57974
The availability of drugs for stable COPD treatment in China: a cross-sectional survey
Published 2025-01-01Get full text
Article -
57975
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01“…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
Get full text
Article -
57976
Metrics for Evaluating Telemedicine in Randomized Controlled Trials: Scoping Review
Published 2025-01-01“… BackgroundTelemedicine involves medical, diagnostic, and treatment-related services using telecommunication technology. Not only does telemedicine contribute to improved patient quality of life and satisfaction by reducing travel time and allowing patients to be seen in their usual environment, but it also has the potential to improve disease management by making it easier for patients to see a doctor. …”
Get full text
Article -
57977
The value of metagenomic next-generation sequencing in the diagnosis of fever of unknown origin
Published 2025-01-01“…Metagenomic next-generation sequencing (mNGS) technology is a promising diagnostic tool for identifying pathogenic microbes of FUO caused by infection. …”
Get full text
Article -
57978
-
57979
Associations of Serum Cystatin C, DNAm Cystatin C, Renal Function, and Mortality in U.S. Adults
Published 2024-12-01Get full text
Article -
57980
چاپ زیستی سه بعدی و جوهرهای زیستی طبیعی مورد استفاده: مفاهیم و کاربردها
Published 2021-02-01Get full text
Article