Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
66681
Implementation of the state policy for innovative development of the heat supply sector
Published 2024-01-01“…The state policy in the sphere of heat supply, aimed at improving the efficiency and reliability of this sphere, as well as achieving its energy security property, is implemented through the functioning of unified heat supply organizations (UHSO), acting as the centre of responsibility, modernization and technological development of heat supply in the assigned territory. …”
Get full text
Article -
66682
THE GENE POOL FOR TABLE BEET BREEDING (MODERN ASPECTS OF STUDY AND USE)
Published 2019-10-01“…The accessions were studied at Pushkin and Pavlovsk Laboratories of VIR, at the Genetic Diversity and Plant Bioresources Center of the All-Russian Breeding and Technological Institute of Horticulture and Nursery (VSTISP) and at Maikop Experiment Station, a branch of VIR, according to VIR’s guidelines. esults. …”
Get full text
Article -
66683
Novel Algorithm for Surgical Management of Cervical Ossification of Posterior Longitudinal Ligament: A Retrospective Cohort Study With 2‐Year Follow‐Up
Published 2025-02-01“…ABSTRACT Object With the development of new technologies, the surgical algorithm for ossification of posterior longitudinal ligament (OPLL) in the cervical spine also needs to be updated. …”
Get full text
Article -
66684
Decision impact studies, evidence of clinical utility for genomic assays in cancer: A scoping review.
Published 2023-01-01“…<h4>Conclusions</h4>This scoping review is a first step in understanding the evolution and uses of decision impact studies and their influence on the integration of emerging genomic technologies in cancer care. The results imply that DIS are positioned to provide evidence of clinical utility and impact clinical practice and reimbursement decision-making in cancer care. …”
Get full text
Article -
66685
How does the concentration of spatial allocation of urban construction land across cities affect carbon emission intensity in China?
Published 2025-01-01“…The mediating effect analysis suggested that CSA indirectly influenced CEI through economic agglomeration (EA), technological innovation (TI), and industrial structure upgrading (ISU). …”
Get full text
Article -
66686
Computational analysis of spliced leader trans-splicing in the regenerative flatworm <i>Macrostomum lignano</i> reveals its prevalence in conserved and stem cell related genes
Published 2021-03-01“…Macrostomum lignano is a flatworm model organism where substantial technological advances have been achieved in recent years, including the development of transgenesis. …”
Get full text
Article -
66687
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…However, the growing level and sophistication of malicious attacks launched on networks in the current technological landscape have necessitated the need for advanced and robust detection mechanisms to mitigate against security breaches of confidentiality, integrity, and denial-of-service. …”
Get full text
Article -
66688
A Deep-Learning Approach to a Volumetric Radio Environment Map Construction for UAV-Assisted Networks
Published 2024-01-01“…Providing global coverage for ubiquitous users is a key requirement of the fifth generation (5G) and beyond wireless technologies. This can be achieved by integrating airborne networks, such as unmanned aerial vehicles (UAVs) and satellite networks, with terrestrial networks. …”
Get full text
Article -
66689
The Experiences of Syrian Female Students During the Distance Education and the Insights of Religious Culture and Ethics Teachers into the Process
Published 2024-12-01“…It was found that Syrian refugee girls struggled with limited financial resources, a lack of technological devices such as tablets and computers, inadequate internet access, and a shortage of appropriate learning environments. …”
Get full text
Article -
66690
Models, systems, networks in economics, engineering, nature and society
Published 2024-11-01“…To effectively manage logistics business processes at the last mile stage, organizations need to take into account various aspects – organizational, competitive, value, technological and environmental.…”
Article -
66691
Metatranscriptomes-based sequence similarity networks uncover genetic signatures within parasitic freshwater microbial eukaryotes
Published 2025-02-01“…Their taxonomic and functional diversity are increasingly well described due to recent advances in sequencing technologies. However, the vast amount of data produced by -omics approaches require data-driven methodologies to make predictions about these microorganisms’ role within ecosystems. …”
Get full text
Article -
66692
Achievements and prospects of applying high-throughput sequencing techniques to potato genetics and breeding
Published 2017-03-01“…The Potato Genome Sequencing Consortium activities included not only constructing genome libraries, sequencing, assembling and annotation of the genome, but also genome sequence-based investigations uncovering features of potato genome evolution, SNP identification, analysis of genes and gene networks regulating resistance to phytopathogens and technological characteristics. An important outcome of the genome sequencing was further identification of more than 8 thousand SNPs and approbation of the Genotyping-by-sequencing (GBS) method on potato, which is the basis for potato genomic selection and for discovery of economically important genes using genome wide association studies (GWAS). …”
Get full text
Article -
66693
The Egyptian Revolution: First Impressions from the Field
Published 2011-02-01“…The Egyptian Revolution, starting on January 25, lacked leadership and possessed little organization; its defining events, on Friday, January 28, occurred on a day when all communication technologies, including all internet and phones, were barred; it took place in a large country known for sedate political life, a very long legacy of authoritarian continuity, and an enviable repressive apparatus consisting of more than 2 million members. …”
Get full text
Article -
66694
Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data
Published 2023-02-01“…Though powerful, limited attempts have been made to showcase the clinical utility of such technologies, especially in the pre- and post-operative imaging arenas. …”
Get full text
Article -
66695
Molecular mechanisms and therapeutic strategies of Naegleria fowleri Carter (1970): a review of the fatal brain-eating amoeba
Published 2024-05-01“…With the advances in genomic and proteomic technologies, new opportunities have emerged to explore the molecular biology of N. fowleri and its host response. …”
Get full text
Article -
66696
Machine learning-based plasma metabolomics for improved cirrhosis risk stratification
Published 2025-02-01“…The rapid development of metabolomic technologies has enabled the capture of metabolic changes related to the progression of cirrhosis. …”
Get full text
Article -
66697
Game-thinking; utilizing serious games and gamification in nursing education – a systematic review and meta-analysis
Published 2025-01-01“…Abstract Background The digital shift in higher education is moving from teacher-focused models to active learning with digital technologies, including the integration of game-based learning strategies. …”
Get full text
Article -
66698
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
66699
Revisiting Weimar Film Reviewers’ Sentiments: Integrating Lexicon-Based Sentiment Analysis with Large Language Models
Published 2024-07-01“…Film scholars have quite rightly been skeptical of such techniques due to their inability to grasp nuanced critical texts. Recent technological developments have, however, given us cause to re-evaluate the usefulness of automated sentiment analysis for historical film reviews. …”
Get full text
Article -
66700
A multi-omics strategy to understand PASC through the RECOVER cohorts: a paradigm for a systems biology approach to the study of chronic conditions
Published 2025-01-01“…RECOVER formed an “OMICS” multidisciplinary task force, including clinicians, pathologists, laboratory scientists and data scientists, charged with developing recommendations to apply cutting-edge system biology technologies to achieve the goals of RECOVER. The task force met biweekly over 14 months, to evaluate published evidence, examine the possible contribution of each “omics” technique to the study of PASC and develop study design recommendations. …”
Get full text
Article