Suggested Topics within your search.
Suggested Topics within your search.
-
1341
Challenges in osteochondral repair—a critical review
Published 2024-09-01“…This critical review addresses the various challenges in OC tissue repair, including (i) anatomical complexities, (ii) biological approaches to restoring the OC interface, and material selection, (iii) cell sources for reconstruction, and (iv) recreating a coordinated microenvironment. …”
Get full text
Article -
1342
Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method
Published 2023-01-01“…This approach will have a mapping from clustering and feature extraction to classification for accurate detection. Based on the analysis and simulation, it is observed that the proposed approach SNN-MFP has 87% accuracy and is 84.71% more functional than the classical method of using only the SNN. …”
Get full text
Article -
1343
mdciao: Accessible Analysis and Visualization of Molecular Dynamics Simulation Data.
Published 2025-04-01“…We present mdciao, an open-source command line tool and Python Application-Programming-Interface (API) for easy, one-shot analysis and representation of molecular dynamics (MD) simulation data. …”
Get full text
Article -
1344
SIMPLE: Simple Intensity Map Producer for Line Emission
Published 2023-01-01“…After applying a selection function to distinguish between detected and undetected galaxies, the code generates an intensity map, which can be modified with anisotropic smoothing, noise, a mask, and sky subtraction, and it calculates the power spectrum multipoles. …”
Get full text
Article -
1345
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1346
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1347
Precision medicine in premature ovarian insufficiency: a focus on the precision therapeutic strategies for mesenchymal stem cells
Published 2025-07-01“…Key issues include the selection of appropriate MSCs sources, the optimization of culture conditions, and the determination of optimal transplantation protocols (encompassing dosage, administration route, and timing), all of which pose significant barriers to clinical translation of MSCs. …”
Get full text
Article -
1348
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
1349
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
1350
Baseline levels of microplastics in agricultural soils obscure the effects of additional microplastics from recycled fertilizers
Published 2025-07-01“…Whilst it was observed from the fluxes that digestate can be a substantial source of microplastics to soils, the comparatively short time of application and the high background at our investigated sites leads to a obscured effect where digestate inputs serve a limited function.…”
Get full text
Article -
1351
Quality and content evaluation of thyroid eye disease treatment information on TikTok and Bilibili
Published 2025-07-01“…Abstract Thyroid eye disease (TED) is an autoimmune condition that commonly impacts patients’ visual function, appearance, and psychological well-being. …”
Get full text
Article -
1352
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
1353
Direction of Arrival Estimation Based on the Multistage Nested Wiener Filter
Published 2015-02-01“…The computation of the proposed method is simple, and the number of detectable signal sources could exceed the number of antenna elements.…”
Get full text
Article -
1354
Optimization of Adversarial Reprogramming for Transfer Learning on Closed Box Models
Published 2025-01-01“…While it has been shown that this concept can work well in image classification, and a further modification has been developed to classify time series features, this work focuses primarily on the remaining key challenges such as the selection and comparison of appropriate loss functions, the optimisation of hyperparameters using Bayesian methods, and data labelling in the absence of ground truth. …”
Get full text
Article -
1355
Recreational Thematic Dominants in News TV Discourse
Published 2022-11-01“…The key tasks of the research are to identify the repertoire of thematic dominants of recreation, their functional characteristics, the specifics of participation in the construction of the news text, as well as a description of the recreation scale.Methodology and sources. …”
Get full text
Article -
1356
Assessment of Serum Vitamin D Levels and Evaluation of Knowledge, Attitude, and Practices of Vitamin D Deficiency among Emergency Health-care Workers at a Tertiary Care Center in N...
Published 2024-01-01“…While most participants were aware of the active form of vitamin D, its sources and critical functions, knowledge about non-skeletal manifestations and measurable forms of vitamin D deficiency was limited. …”
Get full text
Article -
1357
Evaluation of the coupling coordination effect of Hefei Rail transit station area based on supply and demand matching.
Published 2025-01-01“…The coupling of supply and demand in the rail transit station area is an important driving force for ensuring the balanced development between the traffic functions and the place performance of the rail transit station area. …”
Get full text
Article -
1358
MULTI-MODEL STACK ENSEMBLE DEEP LEARNING APPROACH FOR MULTI-DISEASE PREDICTION IN HEALTHCARE APPLICATION
Published 2025-03-01“…These datasets serve two functions: improving illness prediction and examining large data reservoirs to identify previously unknown disease patterns. …”
Get full text
Article -
1359
Genotyping from targeted NGS data based on a small set of SNPs correctly matches patient samples
Published 2025-07-01“…We provide an R function for automated detection of sample swaps and mislabelling to the community as a free and open-source tool.…”
Get full text
Article -
1360
Implementation of stochastic signal processing algorithms in radar CAD
Published 2022-10-01“…A simulation model of a sector surveillance radar with a digital antenna array was created in the radar CAD visual functional editor. The passive channel included the following algorithms: algorithm for detecting stochastic signals; algorithm for estimating the number of stochastic signals; direction finding algorithm for stochastic signal sources; adaptive spatial filtering algorithm. …”
Get full text
Article