Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
-
1281
Targeting Amyloid Pathology in Early Alzheimer’s: The Promise of Donanemab-Azbt
Published 2025-02-01“…It specifically targets and reduces amyloid beta plaques, a hallmark of the disease, potentially slowing progression and preserving cognitive function. However, its administration requires careful patient selection, including genetic testing for ApoE ε4 status, to mitigate risks of ARIA. …”
Get full text
Article -
1282
Assessing chronic obstructive pulmonary disease risk based on exhalation and cough sounds
Published 2025-07-01“…This approach is not only feasible and practical for real-world applications, but also offers an affordable and accessible solution, especially beneficial in resource-limited settings.…”
Get full text
Article -
1283
How to reduce the risk of primary engraftment failure after haploidentical hematopoietic stem cell transplantation in patients with acute myeloid leukemia?
Published 2025-03-01“…Optimizing transplantation strategies, including the selection of the graft source and modification of conditioning regimens, may improve haplo‑HSCT outcomes. …”
Get full text
Article -
1284
Photonics-Aided THz Integrated Sensing and Communication System Based on a Subcarrier-Chirp Inter-Embedded Waveform
Published 2025-01-01“…By fully utilizing the idle time-frequency resources of the LFMCW, a density of information-resolution quotient of up to 46.2 × 10-2 bit·s/m2 has been achieved. …”
Get full text
Article -
1285
Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol
Published 2025-07-01“…The RL-based mechanism continuously adapts decision-making by learning from system states, prioritizing transactions, and dynamically resolving conflicts using a reward function that accounts for key performance parameters, including the number of conflicting transactions, cost of aborting transactions, temporal validity constraints, and system resource utilization. …”
Get full text
Article -
1286
Application of microscopic smartphone attachment for remote preoperative lab testing
Published 2024-11-01“…This device is designed to assist both healthcare providers in resource-limited settings and patients by offering a low-cost, portable diagnostic tool that enables both in-clinic and at-home testing.MethodsThe system was tested for adaptability and compatibility by transitioning from its original Android platform to an iOS platform. …”
Get full text
Article -
1287
Exploring the Medicinal Potential of <i>Taraxacum Kok-Saghyz</i> (<i>TKS</i>) Using Widely Targeted Metabolomics
Published 2025-05-01“…This study presents the first comprehensive metabolic profile of <i>TKS</i>, highlighting its potential value beyond rubber production. The detection of numerous therapeutic secondary metabolites supports its promise as a pharmaceutical and nutraceutical resource. …”
Get full text
Article -
1288
Effects of Covid-19 Pandemic on School Dropout in Selected Primry Schools in Nyarusiza Sub-County Kisoro District.
Published 2024“…Innovative approaches could be used such as applications of artificial intelligence in high-risk/high-traffic sites to enhance COVID-19 detection efficiency while protecting medical staff and the general public from cross-infections The government should establish a physical and automated platform for coordination and resource mobilization for support to the poor pupils and the most vulnerable groups affected by COVID-19-related lockdown.…”
Get full text
Thesis -
1289
Precision medicine in premature ovarian insufficiency: a focus on the precision therapeutic strategies for mesenchymal stem cells
Published 2025-07-01“…Key issues include the selection of appropriate MSCs sources, the optimization of culture conditions, and the determination of optimal transplantation protocols (encompassing dosage, administration route, and timing), all of which pose significant barriers to clinical translation of MSCs. …”
Get full text
Article -
1290
Effect of PM2.5 exposure on susceptibility to allergic asthma in elderly rats treated with allergens
Published 2025-02-01Get full text
Article -
1291
-
1292
Early Fault-Tolerant Quantum Algorithms in Practice: Application to Ground-State Energy Estimation
Published 2025-04-01“…Additionally, we provide quantitative resource estimates, demonstrating a constant factor improvement in the number of samples required to detect a specified change in CDF. …”
Get full text
Article -
1293
FXYD2 marks and regulates maturity of β cells via ion channel-mediated signal transduction
Published 2025-06-01“…These results suggest that FXYD2 marks and regulates human β cell maturation via channel-sensing signal transduction and that it can be used as a selection marker for functional heterogeneity of stem cell derived human islet organoids.…”
Get full text
Article -
1294
Genotyping from targeted NGS data based on a small set of SNPs correctly matches patient samples
Published 2025-07-01“…In two cohorts of totally 1441 patients with sequential samples, we could identify 3 sample swaps, 7 mislabelled samples (3 externally and 4 internally) and 1 mistake of unknown origin. We provide an R function for automated detection of sample swaps and mislabelling to the community as a free and open-source tool.…”
Get full text
Article -
1295
A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye
Published 2022-12-01“…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
Get full text
Article -
1296
The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan...
Published 2022-03-01“…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
Get full text
Article -
1297
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
1298
A directed greybox fuzzer for windows applications
Published 2025-07-01“…Abstract Directed greybox fuzzing (DGF) has proven effective in vulnerability discovery, but most efforts focus on the Linux platform, with substantially less attention devoted to Windows platform due to its closed-source and GUI software nature. This paper proposes WinDGF, a novel directed greybox fuzzer for Windows applications that addresses challenges including target function localization in persistent testing, GUI bypassing, and fitness metric calculation. …”
Get full text
Article -
1299
CHARTER OF THE STAVROPOL KRAI: PROBLEM ISSUES AND SEARCH FOR SOLUTION
Published 2021-09-01“…The interpretation of the source of the government of the Stavropol Krai, which is the people of the Stavropol Kraias part of the multinational people of the Russian Federation, has been proposed. …”
Get full text
Article -
1300
Prevalence and determinants of restrictive lung disorder among quarry workers at the Umuoghara quarry site, Ebonyi State, Nigeria: a cross-sectional study
Published 2025-01-01“…Data was collected using a pre-tested semi-structured questionnaire among 300 quarry workers selected by simple random sampling method. Lung function test was performed using a spirometer- spirovit SPI schiller and data was analyzed with the use of IBM SPSS version 23.0. …”
Get full text
Article