-
1461
Who Leads Trends on Q&A Platforms? Identifying and Analyzing Trend Discoverers
Published 2024-01-01“…Q&A platforms are vital sources of information but often face challenges related to their high ratios of passive to active contributors, which can impede knowledge construction and information exchange on the platforms. …”
Get full text
Article -
1462
Single-cell transcriptional responses of T cells during microsporidia infection
Published 2025-04-01Get full text
Article -
1463
Validation of a 60K SNP chip for caribou (Rangifer tarandus) for use in wildlife forensics, conservation, and management
Published 2024-12-01“…The SNP chip was shown to be robust, highly sensitive, reliable, and accurate at more than 10-fold below the recommended DNA input. Biological source of DNA had minor impact, even with fecal pellets given sufficient amount of host DNA. …”
Get full text
Article -
1464
Microfluidic Nanobioplatform-Based Immunosensor for Monitoring of 25-Hydroxy Vitamin-D3
Published 2024-01-01“…The use of proposed immunosensor to serum samples would allow early detection of 25-VitD _3 deficiency, particularly in rural and resource-constrained settings.…”
Get full text
Article -
1465
Accelerated low-intensity rTMS does not rescue anxiety behaviour or abnormal connectivity in young adult rats following chronic restraint stress
Published 2022-09-01“…Behaviour was assessed using the Elevated Plus Maze and Forced Swim Test, and functional, chemical, and structural brain changes measured using magnetic resonance imaging techniques. …”
Get full text
Article -
1466
The Diversity of Cold Worlds: A Blended-light Binary Straddling the T/Y Transition in Brown Dwarfs
Published 2025-01-01“…Carbon disequilibrium chemistry strongly shapes the mid-infrared spectra of these sources, as a complex function of the metallicity and surface gravity. …”
Get full text
Article -
1467
The biomarker potential of circPOLD1 and its binding protein YBX1 in cervical carcinogenesis
Published 2025-05-01“…Mechanistically, circPOLD1 functioned as an oncogene by binding to and phosphorylating YBX1, activating the AKT/mTOR/HIF-1α pathway to enhance glycolysis-driven tumorigenesis. …”
Get full text
Article -
1468
Unveiling the complex double-edged sword role of exosomes in nasopharyngeal carcinoma
Published 2025-01-01“…Exosomes are small membrane vesicles at the nanoscale that transport physiologically active compounds from their source cell and have a crucial function in signal transmission and intercellular message exchange. …”
Get full text
Article -
1469
Face Recognition Door Security System and Contactless Bell
Published 2024-02-01“…Face recognition uses OpenCV based on an open source library to recognize faces in realtime using the Python programming language. …”
Get full text
Article -
1470
State immunological reactivity and autonomic regulation in patients with chronic apical periodontitis
Published 2020-04-01“…In this paper we studied 107 people with a diagnosis of «chronic apical periodontitis». The functional state of the autonomic nervous system were detected by electrophoresis dosed adrenaline and carbachol and test dermographism. …”
Get full text
Article -
1471
Landscape of extracellular small RNA and identification of biomarkers in multiple human cancers
Published 2025-08-01“…Summary: Extracellular RNAs (exRNAs) in biofluids, sourced from diverse tissues, exhibit various biological functions and diagnostic potential. …”
Get full text
Article -
1472
Pediatric Adenotonsillectomy Trial for Snoring (PATS): protocol for a randomised controlled trial to evaluate the effect of adenotonsillectomy in treating mild obstructive sleep-di...
Published 2020-03-01“…The study’s coprimary endpoints are (1) change from baseline in executive behaviour relating to self-regulation and organisation skills as measured by the Behavioural Rating Inventory of Executive Function (BRIEF) Global Composite Score (GEC); and (2) change from baseline in vigilance as measured on the Go-No-Go (GNG) signal detection parameter (d-prime). …”
Get full text
Article -
1473
Comparative metabolomic profiling of Lupinus albus and L. angustifolius harvest residues: exploring chemical diversity and valorization potential
Published 2025-07-01“…Lupin species are a rich source of bioactive compounds with diverse industrial applications, yet their harvest residues remain underutilized. …”
Get full text
Article -
1474
Reconstruction of defects in elastic bodies by combination of genetic algorithm and finite element method
Published 2016-06-01“…The inverse problem solution is based on the minimization of the residual functional between the measured input source information and the data calculated during the numerical solution of direct problems with the given parameters of defects. …”
Get full text
Article -
1475
Synthesis and Production of Sweet-Tasting Protein in E. coli and Purification by Amylose Resin
Published 2011-06-01“…However, the extraction of brazzein from its natural source is expensive and not applicable. In this study we used recombinant DNA technology to provide an alternative option for cheaper mass production of brazzein. …”
Get full text
Article -
1476
Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms
Published 2025-12-01“…Machine learning models can process complex datasets, identify hidden patterns, and facilitate early risk detection, enabling banks to implement preventive measures before risks materialize. …”
Get full text
Article -
1477
Intranasal administration of stem cell derivatives for the treatment of AD animal models: a systematic review and meta-analysis
Published 2025-07-01“…Subgroup analyses indicated that stem cell source, stem cell derivative types and Aβ detection method were not primary drivers of heterogeneity. …”
Get full text
Article -
1478
Inference of a plume conduit beneath the Réunion Island from 3D migration of Ps conversions from the mantle transition zone
Published 2025-03-01“…These maiden results shed-light on the high-temperature anomalies in the mid-mantle, probably sourced from the Réunion plume and provide evidence for the Majorite-garnet phase transformation at 660 km discontinuity. …”
Get full text
Article -
1479
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1480
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article