Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
resourcess » resource (Expand Search), resourcesss (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resourcess » resource (Expand Search), resourcesss (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
1281
Pathogenesis of Apical Periodontitis: a Literature Review
Published 2011-09-01“…Additionally, a manual search in the cytokine production, cytokine functions and periapical tissue destruction in the journals and books was performed.Results: In total, 97 literature sources were obtained and reviewed. …”
Get full text
Article -
1282
Seismic fault identification method based on CBAM-TransUNet
Published 2025-02-01Get full text
Article -
1283
Mutation of the histone demethylase Gasc1 causes ASD-like symptoms in mice
Published 2025-07-01Get full text
Article -
1284
-
1285
Зелені дахи в сучасному благоустрої міст
Published 2021-12-01“…A few Ukrainian and foreign sources dealing with this problem were processed. …”
Get full text
Article -
1286
-
1287
Speech etiquette situation of apology in classes of Russian as a foreign language (on the example of Asya Petrova's story «Sorry, Fool»)
Published 2023-08-01“…Since reading as a kind of speech activity is connected with the cognitive function of the language, the proper selection of texts in the classes of Russian as a foreign language contributes to the application of the factual information contained in them in practice, as well as increasing linguocountryological competence of students. …”
Get full text
Article -
1288
-
1289
-
1290
SIU-ICUD: Principles and Outcomes of Focal Therapy in Localized Prostate Cancer
Published 2025-06-01“…Cancer control rates vary by energy modality, tumor characteristics, and institutional experience, demonstrating comparable outcomes to radical treatments in well-selected patients. The safety profile is excellent, with high rates of urinary continence and sexual function preservation. …”
Get full text
Article -
1291
Study on River System Flood Forecasting Scheme for Longtan Hydropower Station Interval in Hongshui River
Published 2024-01-01“…Longtan Hydropower Station is a flood control project in the Pearl River Basin,but there is currently a lack of a comprehensive river system flood forecasting scheme.In order to give full play to the flood control and storage function of Longtan Hydropower Station,tributary control stations such as Leigongtan,Moyang,Pinglihe,Pinghu,and Xianrenqiao are selected,and the key areas of concern are determined through the analysis of important sub-intervals.The river system flood forecasting scheme for the Longtan Hydropower Station interval is constructed by using the Xin'an River three-source runoff generation model,three-source lag routing convergence model,and Maskingen convergence algorithm.The research results show that the proportion of the maximum inflow flood volume of Longtan Hydropower Station is usually in uncontrolled intervals,followed by the tributaries in Guizhou Province (Mengjiang River,Bawang River,Caodu River,and Liudong River),which are the focus of flood forecasting.The total average relative peak flow error and the average relative flood volume error in the river system flood forecasting scheme are both 10%,and the average deterministic coefficients are above 0.75.The overall results are relatively accurate.Therefore,the river system flood forecasting scheme for the Longtan Hydropower Station interval can be applied to real-time flood operation forecasting,and it lays a solid foundation for further improving the “forecast,early warning,rehearsal,and contingency plan” capability.…”
Get full text
Article -
1292
Insight into influence of degradation metabolism of Firmicutes on the microstructure of anthracite coal
Published 2025-01-01“…Fourier Transform Infrared Spectrometer (FTIR) experiments revealed that biodegradation stimulated by nitrogen source reduced the aromaticity of coal by 59.62% and enhanced the hydroxyl functional group content by 1.822 times. …”
Get full text
Article -
1293
LIFE CYCLE ASSESSMENT IN HEALTHCARE SYSTEM OPTIMIZATION. INTRODUCTION
Published 2015-03-01“…Various factors and parameters that may influence effectiveness of different sectors in healthcare system are detected. Performance optimization of detected parameters could lead to better system functioning, higher patient safety, economic sustainability and reduce resources consumption.…”
Get full text
Article -
1294
-
1295
Identification and odor exposure regulation of odorant-binding proteins in Picromerus lewisi
Published 2024-12-01Get full text
Article -
1296
Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress
Published 2024-12-01“…This model allows for the flexible integration of the timing and functional form of the uptake of technological innovations that are assumed to influence catchability. …”
Get full text
Article -
1297
Impact of health literacy in patients with chronic musculoskeletal disease--systematic review.
Published 2012-01-01“…We assessed risk of bias from participant selection, methods of measuring health literacy and functional outcomes, missing data, and potential for confounding.…”
Get full text
Article -
1298
MaGIC: a program to generate targeted marker sets for genome-wide association studies
Published 2004-12-01“…Maps are in base pairs or linkage disequilibrium units (LDUs) as derived from the International HapMap data, which is useful for association studies and fine-mapping. Markers may be selected on the basis of heterozygosity and source database, and single nucleotide polymorphism (SNP) markers may additionally be selected on the basis of validation status. …”
Get full text
Article -
1299
Survey on Backdoor Attacks on Deep Learning: Current Trends, Categorization, Applications, Research Challenges, and Future Prospects
Published 2025-01-01“…Such attacks are usually referred to as Trojan or backdoor attacks and are very stealthy and hard to detect. In this paper, we highlight the complete attack surface that can be exploited to inject hidden malicious functionality (backdoors) in machine learning models. …”
Get full text
Article -
1300