-
421
-
422
Ti3C2Tx@Pt nanocomposite based colorimetric and electrochemical dual-mode platform for glucose detection
Published 2025-06-01“…Glucose is the main source of energy in cellular metabolism and is essential for normal cellular function and growth. …”
Get full text
Article -
423
Neurocognitive factors of new drone Pilots: Identifying candidates with expert potential
Published 2025-08-01“…Introduction: The increasing use of drones in both military and civilian applications underscores the critical need for the proper selection and training of pilots. Identifying the neurocognitive variables that influence the performance of these pilots can optimize selection and training processes. …”
Get full text
Article -
424
-
425
-
426
The valorization of poppy seed cake for Pickering stabilization of functional ice creams
Published 2025-06-01Get full text
Article -
427
Potential and Observed Supply–Demand Characteristics of Medical Services: A Case Study of Nighttime Visits in Shenzhen
Published 2024-10-01“…Hospital selection patterns are essential for evaluating medical accessibility and optimizing resource management. …”
Get full text
Article -
428
Ideal teacher of higher school: Personal qualities and socio-professional competencies
Published 2021-01-01Get full text
Article -
429
-
430
ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides
Published 2025-01-01“…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
Get full text
Article -
431
Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection
Published 2025-05-01“…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
Get full text
Article -
432
Multi-Function Evaluation and Internal Land Use Optimization of Rural Settlements
Published 2025-03-01Get full text
Article -
433
Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms
Published 2021-01-01“…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
Get full text
Article -
434
Integrated genomic and transcriptomic analysis of polydactyly in chickens
Published 2025-05-01Get full text
Article -
435
Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features
Published 2025-03-01“…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
Get full text
Article -
436
Progress in functional covalent organic frameworks as advanced materials for sample pretreatment
Published 2025-08-01Get full text
Article -
437
Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU
Published 2025-01-01“…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
Get full text
Article -
438
-
439
YOLOX-LS: Strong Gravitational Lenses Detection in the DECaLS with Deep Learning
Published 2025-01-01Get full text
Article -
440
A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks
Published 2025-01-01“…In the host, we employ a combination of ping Round-Trip Time (RTT) anomaly detection, the SendARP function, static entry, and ping confirmation to detect and mitigate attacks. …”
Get full text
Article