Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functions » function (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
1581
The impact of dyadic interventions on psycho-social outcomes for stroke patients and their caregivers: a systematic review and meta-analysis
Published 2025-05-01“…AimsTo describe the details of dyadic interventions and summarize the current evidence on supporting dyadic interventions for psycho-social outcomes of stroke patients and their caregivers.DesignA systematic review and meta-analysis based on PRISMA guidelines.Data sourcesFive English databases (PubMed, Web of Science, CINAHL, Embase and Cochrane Library) were searched to identify eligible studies published from the inception to October 15, 2024.MethodsTwo reviewers independently screened the literature in accordance with the selection criteria. …”
Get full text
Article -
1582
Genetic and biotechnological characterization of folate-producing probiotics isolated from local dairy products
Published 2025-06-01“…The findings support strain selection for folate-enriched functional foods.…”
Get full text
Article -
1583
Stacked ensemble model for accurate crop yield prediction using machine learning techniques
Published 2025-01-01“…Historically, such predictions have utilized diverse data sources, including agricultural, land, climatic, atmospheric, and other pertinent information. …”
Get full text
Article -
1584
Atrial Fibrillation: the Association with Physical Activity and the Effects of Cardiac Rehabilitation
Published 2020-11-01“…This is mainly due to the complexity of selection of physical rehabilitation program for patients with AF. …”
Get full text
Article -
1585
A novel efferocytosis-related gene signature for predicting prognosis and therapeutic response in bladder cancer
Published 2025-06-01“…A prognostic model was subsequently developed using least absolute shrinkage and selection operator (LASSO) and multivariate Cox regression. …”
Get full text
Article -
1586
Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i
Published 2024-10-01“…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
Get full text
Article -
1587
The State and Prospects of Using Digital HR Tools by Russian Companies
Published 2020-09-01“…A comparative analysis of modern automation systems for personnel selection is presented and an assessment of their technological functionality is carried out. …”
Get full text
Article -
1588
Biochemical, nutritional, and nutraceutical properties of cactus pear accessions
Published 2025-06-01“…These findings contribute valuable insights for the conservation and utilization of wild cactus pear genetic resources, supporting the development of functional food products and sustainable cultivation strategies in Mediterranean climates.…”
Get full text
Article -
1589
Fate and risks of potentially toxic elements associated with lacustrine groundwater discharge: quantification, modeling, and biogeochemistry
Published 2025-08-01“…Thus, self-organizing maps (SOM) and positive matrix factorization (PMF) were employed in present work to decipher source of selected PTE (Li, V, Mn, Cr, Co, Ni, Cu, Zn, Ba, Pb, U, Sr) in Ulansuhai Lake basin (Inner Mongolia, China). …”
Get full text
Article -
1590
Screening of anomalies in a double-stranded DNA via global electrical measurements
Published 2025-06-01“…We conduct two-terminal charge transport calculations to detect biological defects in three types of DNA sequences: periodic, quasi-periodic and random. …”
Get full text
Article -
1591
Semi-Automated Dataset Generation for Residential Buildings Using Graph-Based Topological Modelling
Published 2025-04-01“…The resulting dataset facilitates the analysis of floor spatial configurations and the extraction of geometric attributes, laying the foundation for future analyses that will integrate machine learning techniques for functional detection and typological clustering.…”
Get full text
Article -
1592
Genotyping from targeted NGS data based on a small set of SNPs correctly matches patient samples
Published 2025-07-01“…In two cohorts of totally 1441 patients with sequential samples, we could identify 3 sample swaps, 7 mislabelled samples (3 externally and 4 internally) and 1 mistake of unknown origin. We provide an R function for automated detection of sample swaps and mislabelling to the community as a free and open-source tool.…”
Get full text
Article -
1593
Preventive home visits for mortality, morbidity, and institutionalization in older adults: a systematic review and meta-analysis.
Published 2014-01-01“…<h4>Background</h4>Home visits for older adults aim to prevent cognitive and functional impairment, thus reducing institutionalization and mortality. …”
Get full text
Article -
1594
Extracting Filaments Based on Morphology Components Analysis from Radio Astronomical Images
Published 2019-01-01“…MCA uses a dictionary whose elements can be wavelet translation function, curvelet translation function, or ridgelet translation function to decompose images. …”
Get full text
Article -
1595
A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye
Published 2022-12-01“…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
Get full text
Article -
1596
The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan...
Published 2022-03-01“…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
Get full text
Article -
1597
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
1598
Exploring Nonlinear Threshold Effects and Interactions Between Built Environment and Urban Vitality at the Block Level Using Machine Learning
Published 2025-06-01“…This study proposed to develop a comprehensive framework for urban vitality by incorporating multi-source data, and the central urban area of Xi’an, China, was selected as the study area. …”
Get full text
Article -
1599
A directed greybox fuzzer for windows applications
Published 2025-07-01“…Abstract Directed greybox fuzzing (DGF) has proven effective in vulnerability discovery, but most efforts focus on the Linux platform, with substantially less attention devoted to Windows platform due to its closed-source and GUI software nature. This paper proposes WinDGF, a novel directed greybox fuzzer for Windows applications that addresses challenges including target function localization in persistent testing, GUI bypassing, and fitness metric calculation. …”
Get full text
Article -
1600
Isolation and Screening of Lactic Acid Bacteria From Sumbawa Buffalo Milk (Bubalus bubalis) as Potential Starter Cultures
Published 2022-10-01“…Besides containing nutrients that are very beneficial for human health, buffalo milk is also a potential source of lactic acid bacteria (LAB) with technological and functional properties. …”
Get full text
Article