Showing 66,681 - 66,700 results of 68,043 for search '"technology"', query time: 0.24s Refine Results
  1. 66681

    Implementation of the state policy for innovative development of the heat supply sector by Yu. O. Bakrunov, V. V. Glazkova

    Published 2024-01-01
    “…The state policy in the sphere of heat supply, aimed at improving the efficiency and reliability of this sphere, as well as achieving its energy security property, is implemented through the functioning of unified heat supply organizations (UHSO), acting as the centre of responsibility, modernization and technological development of heat supply in the assigned territory. …”
    Get full text
    Article
  2. 66682

    THE GENE POOL FOR TABLE BEET BREEDING (MODERN ASPECTS OF STUDY AND USE) by V. I. Burenin, D. V. Sokolova, T. M. Piskunova

    Published 2019-10-01
    “…The accessions were studied at Pushkin and Pavlovsk Laboratories of VIR, at the Genetic Diversity and Plant Bioresources Center of the All-Russian Breeding and Technological Institute of Horticulture and Nursery (VSTISP) and at Maikop Experiment Station, a branch of VIR, according to VIR’s guidelines. esults. …”
    Get full text
    Article
  3. 66683

    Novel Algorithm for Surgical Management of Cervical Ossification of Posterior Longitudinal Ligament: A Retrospective Cohort Study With 2‐Year Follow‐Up by Zhuyun Cai, Hui Kang, Lei Quan, Yilong Ren, Meng Fang, Yixuan Tan, Haochen Zhang, Xuhui Zhou, Jun Ma

    Published 2025-02-01
    “…ABSTRACT Object With the development of new technologies, the surgical algorithm for ossification of posterior longitudinal ligament (OPLL) in the cervical spine also needs to be updated. …”
    Get full text
    Article
  4. 66684

    Decision impact studies, evidence of clinical utility for genomic assays in cancer: A scoping review. by Gillian Parker, Sarah Hunter, Samer Ghazi, Robin Z Hayeems, Francois Rousseau, Fiona A Miller

    Published 2023-01-01
    “…<h4>Conclusions</h4>This scoping review is a first step in understanding the evolution and uses of decision impact studies and their influence on the integration of emerging genomic technologies in cancer care. The results imply that DIS are positioned to provide evidence of clinical utility and impact clinical practice and reimbursement decision-making in cancer care. …”
    Get full text
    Article
  5. 66685

    How does the concentration of spatial allocation of urban construction land across cities affect carbon emission intensity in China? by Hui Yang, Cheng Chen, Jingye Li, Min Li, Stefan Sieber, Kaisheng Long

    Published 2025-01-01
    “…The mediating effect analysis suggested that CSA indirectly influenced CEI through economic agglomeration (EA), technological innovation (TI), and industrial structure upgrading (ISU). …”
    Get full text
    Article
  6. 66686

    Computational analysis of spliced leader trans-splicing in the regenerative flatworm <i>Macrostomum lignano</i> reveals its prevalence in conserved and stem cell related genes by K. V. Ustyantsev, E. V. Berezikov

    Published 2021-03-01
    “…Macrostomum lignano is a flatworm model organism where substantial technological advances have been achieved in recent years, including the development of transgenesis. …”
    Get full text
    Article
  7. 66687

    Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model by Godfrey A. Mills, Daniel K. Acquah, Robert A. Sowah

    Published 2024-01-01
    “…However, the growing level and sophistication of malicious attacks launched on networks in the current technological landscape have necessitated the need for advanced and robust detection mechanisms to mitigate against security breaches of confidentiality, integrity, and denial-of-service. …”
    Get full text
    Article
  8. 66688

    A Deep-Learning Approach to a Volumetric Radio Environment Map Construction for UAV-Assisted Networks by Bethelhem S. Shawel, Dereje H. Woldegebreal, Sofie Pollin

    Published 2024-01-01
    “…Providing global coverage for ubiquitous users is a key requirement of the fifth generation (5G) and beyond wireless technologies. This can be achieved by integrating airborne networks, such as unmanned aerial vehicles (UAVs) and satellite networks, with terrestrial networks. …”
    Get full text
    Article
  9. 66689

    The Experiences of Syrian Female Students During the Distance Education and the Insights of Religious Culture and Ethics Teachers into the Process by İshak Tekin, Mustafa Fatih Ay

    Published 2024-12-01
    “…It was found that Syrian refugee girls struggled with limited financial resources, a lack of technological devices such as tablets and computers, inadequate internet access, and a shortage of appropriate learning environments. …”
    Get full text
    Article
  10. 66690

    Models, systems, networks in economics, engineering, nature and society by S.V. Zinchenko

    Published 2024-11-01
    “…To effectively manage logistics business processes at the last mile stage, organizations need to take into account various aspects – organizational, competitive, value, technological and environmental.…”
    Article
  11. 66691

    Metatranscriptomes-based sequence similarity networks uncover genetic signatures within parasitic freshwater microbial eukaryotes by Arthur Monjot, Jérémy Rousseau, Lucie Bittner, Cécile Lepère

    Published 2025-02-01
    “…Their taxonomic and functional diversity are increasingly well described due to recent advances in sequencing technologies. However, the vast amount of data produced by -omics approaches require data-driven methodologies to make predictions about these microorganisms’ role within ecosystems. …”
    Get full text
    Article
  12. 66692

    Achievements and prospects of applying high-throughput sequencing techniques to potato genetics and breeding by I. V. Bykova, N. A. Shmakov, D. A. Afonnikov, A. V. Kochetov, E. K. Khlestkina

    Published 2017-03-01
    “…The Potato Genome Sequencing Consortium activities included not only constructing genome libraries, sequencing, assembling and annotation of the genome, but also genome sequence-based investigations uncovering features of potato genome evolution, SNP identification, analysis of genes and gene networks regulating resistance to phytopathogens and technological characteristics. An important outcome of the genome sequencing was further identification of more than 8 thousand SNPs and approbation of the Genotyping-by-sequencing (GBS) method on potato, which is the basis for potato genomic selection and for discovery of economically important genes using genome wide association studies (GWAS). …”
    Get full text
    Article
  13. 66693

    The Egyptian Revolution: First Impressions from the Field by Mohammed A. Bamyeh

    Published 2011-02-01
    “…The Egyptian Revolution, starting on January 25, lacked leadership and possessed little organization; its defining events, on Friday, January 28, occurred on a day when all communication technologies, including all internet and phones, were barred; it took place in a large country known for sedate political life, a very long legacy of authoritarian continuity, and an enviable repressive apparatus consisting of more than 2 million members. …”
    Get full text
    Article
  14. 66694

    Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data by Sai Batchu, Michael J. Diaz, Lauren Ladehoff, Kevin Root, Brandon Lucke-Wold

    Published 2023-02-01
    “…Though powerful, limited attempts have been made to showcase the clinical utility of such technologies, especially in the pre- and post-operative imaging arenas. …”
    Get full text
    Article
  15. 66695

    Molecular mechanisms and therapeutic strategies of Naegleria fowleri Carter (1970): a review of the fatal brain-eating amoeba by N. Datta

    Published 2024-05-01
    “…With the advances in genomic and proteomic technologies, new opportunities have emerged to explore the molecular biology of N. fowleri and its host response. …”
    Get full text
    Article
  16. 66696

    Machine learning-based plasma metabolomics for improved cirrhosis risk stratification by Jingru Song, Ziwei Gao, Liqun Lai, Jie Zhang, Binbin Liu, Yi Sang, Siqi Chen, Jiachen Qi, Yujun Zhang, Huang Kai, Wei Ye

    Published 2025-02-01
    “…The rapid development of metabolomic technologies has enabled the capture of metabolic changes related to the progression of cirrhosis. …”
    Get full text
    Article
  17. 66697

    Game-thinking; utilizing serious games and gamification in nursing education – a systematic review and meta-analysis by Mats Nylén-Eriksen, Marko Stojiljkovic, Daniela Lillekroken, Katrin Lindeflaten, Elisabeth Hessevaagbakke, Tone Nygaard Flølo, Olav Johannes Hovland, Ada Marie Svarstad Solberg, Sylvia Hansen, Ann Kristin Bjørnnes, Christine Tørris

    Published 2025-01-01
    “…Abstract Background The digital shift in higher education is moving from teacher-focused models to active learning with digital technologies, including the integration of game-based learning strategies. …”
    Get full text
    Article
  18. 66698

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  19. 66699

    Revisiting Weimar Film Reviewers’ Sentiments: Integrating Lexicon-Based Sentiment Analysis with Large Language Models by Isadora Campregher Paiva, Josephine Diecke

    Published 2024-07-01
    “…Film scholars have quite rightly been skeptical of such techniques due to their inability to grasp nuanced critical texts. Recent technological developments have, however, given us cause to re-evaluate the usefulness of automated sentiment analysis for historical film reviews. …”
    Get full text
    Article
  20. 66700

    A multi-omics strategy to understand PASC through the RECOVER cohorts: a paradigm for a systems biology approach to the study of chronic conditions by Jun Sun, Masanori Aikawa, Hassan Ashktorab, Noam D. Beckmann, Noam D. Beckmann, Michael L. Enger, Joaquin M. Espinosa, Xiaowu Gai, Xiaowu Gai, Benjamin D. Horne, Benjamin D. Horne, Paul Keim, Paul Keim, Paul Keim, Jessica Lasky-Su, Rebecca Letts, Cheryl L. Maier, Meisha Mandal, Lauren Nichols, Nadia R. Roan, Nadia R. Roan, Mark W. Russell, Jacqueline Rutter, George R. Saade, George R. Saade, Kumar Sharma, Kumar Sharma, Stephanie Shiau, Stephen N. Thibodeau, Samuel Yang, Lucio Miele, NIH Researching COVID to Enhance Recovery (RECOVER) Consortium

    Published 2025-01-01
    “…RECOVER formed an “OMICS” multidisciplinary task force, including clinicians, pathologists, laboratory scientists and data scientists, charged with developing recommendations to apply cutting-edge system biology technologies to achieve the goals of RECOVER. The task force met biweekly over 14 months, to evaluate published evidence, examine the possible contribution of each “omics” technique to the study of PASC and develop study design recommendations. …”
    Get full text
    Article