Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
-
1521
The impact of dyadic interventions on psycho-social outcomes for stroke patients and their caregivers: a systematic review and meta-analysis
Published 2025-05-01“…AimsTo describe the details of dyadic interventions and summarize the current evidence on supporting dyadic interventions for psycho-social outcomes of stroke patients and their caregivers.DesignA systematic review and meta-analysis based on PRISMA guidelines.Data sourcesFive English databases (PubMed, Web of Science, CINAHL, Embase and Cochrane Library) were searched to identify eligible studies published from the inception to October 15, 2024.MethodsTwo reviewers independently screened the literature in accordance with the selection criteria. …”
Get full text
Article -
1522
Genetic and biotechnological characterization of folate-producing probiotics isolated from local dairy products
Published 2025-06-01“…The findings support strain selection for folate-enriched functional foods.…”
Get full text
Article -
1523
Stacked ensemble model for accurate crop yield prediction using machine learning techniques
Published 2025-01-01“…Historically, such predictions have utilized diverse data sources, including agricultural, land, climatic, atmospheric, and other pertinent information. …”
Get full text
Article -
1524
Atrial Fibrillation: the Association with Physical Activity and the Effects of Cardiac Rehabilitation
Published 2020-11-01“…This is mainly due to the complexity of selection of physical rehabilitation program for patients with AF. …”
Get full text
Article -
1525
A novel efferocytosis-related gene signature for predicting prognosis and therapeutic response in bladder cancer
Published 2025-06-01“…A prognostic model was subsequently developed using least absolute shrinkage and selection operator (LASSO) and multivariate Cox regression. …”
Get full text
Article -
1526
Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i
Published 2024-10-01“…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
Get full text
Article -
1527
The State and Prospects of Using Digital HR Tools by Russian Companies
Published 2020-09-01“…A comparative analysis of modern automation systems for personnel selection is presented and an assessment of their technological functionality is carried out. …”
Get full text
Article -
1528
Fate and risks of potentially toxic elements associated with lacustrine groundwater discharge: quantification, modeling, and biogeochemistry
Published 2025-08-01“…Thus, self-organizing maps (SOM) and positive matrix factorization (PMF) were employed in present work to decipher source of selected PTE (Li, V, Mn, Cr, Co, Ni, Cu, Zn, Ba, Pb, U, Sr) in Ulansuhai Lake basin (Inner Mongolia, China). …”
Get full text
Article -
1529
Microalgal Metabolomes and Recent Biotechnological Advances for Their Industrial Application
Published 2024-10-01“…In recent decades, microalgae have emerged as new sustainable resources for the production of various bioactive and biochemical compounds. …”
Get full text
Article -
1530
-
1531
Genotyping from targeted NGS data based on a small set of SNPs correctly matches patient samples
Published 2025-07-01“…In two cohorts of totally 1441 patients with sequential samples, we could identify 3 sample swaps, 7 mislabelled samples (3 externally and 4 internally) and 1 mistake of unknown origin. We provide an R function for automated detection of sample swaps and mislabelling to the community as a free and open-source tool.…”
Get full text
Article -
1532
Preventive home visits for mortality, morbidity, and institutionalization in older adults: a systematic review and meta-analysis.
Published 2014-01-01“…<h4>Background</h4>Home visits for older adults aim to prevent cognitive and functional impairment, thus reducing institutionalization and mortality. …”
Get full text
Article -
1533
Extracting Filaments Based on Morphology Components Analysis from Radio Astronomical Images
Published 2019-01-01“…MCA uses a dictionary whose elements can be wavelet translation function, curvelet translation function, or ridgelet translation function to decompose images. …”
Get full text
Article -
1534
A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye
Published 2022-12-01“…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
Get full text
Article -
1535
The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan...
Published 2022-03-01“…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
Get full text
Article -
1536
-
1537
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
1538
Exploring Nonlinear Threshold Effects and Interactions Between Built Environment and Urban Vitality at the Block Level Using Machine Learning
Published 2025-06-01“…This study proposed to develop a comprehensive framework for urban vitality by incorporating multi-source data, and the central urban area of Xi’an, China, was selected as the study area. …”
Get full text
Article -
1539
A directed greybox fuzzer for windows applications
Published 2025-07-01“…Abstract Directed greybox fuzzing (DGF) has proven effective in vulnerability discovery, but most efforts focus on the Linux platform, with substantially less attention devoted to Windows platform due to its closed-source and GUI software nature. This paper proposes WinDGF, a novel directed greybox fuzzer for Windows applications that addresses challenges including target function localization in persistent testing, GUI bypassing, and fitness metric calculation. …”
Get full text
Article -
1540
Isolation and Screening of Lactic Acid Bacteria From Sumbawa Buffalo Milk (Bubalus bubalis) as Potential Starter Cultures
Published 2022-10-01“…Besides containing nutrients that are very beneficial for human health, buffalo milk is also a potential source of lactic acid bacteria (LAB) with technological and functional properties. …”
Get full text
Article