Suggested Topics within your search.
Suggested Topics within your search.
-
1121
Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm.
Published 2025-01-01“…The algorithm then uses hybrid clustering methods for gene module detection. Finally, it combines integrated feature selection methods to determine the gene biomarkers. …”
Get full text
Article -
1122
Efficient Use of Variation in Evolutionary Optimization
Published 2010-01-01“…Commonly used selection algorithms contain several sources of inefficiency, some of which are easily avoided and others of which are not. …”
Get full text
Article -
1123
Gene-Environment Interactions in Stress Response Contribute Additively to a Genotype-Environment Interaction.
Published 2016-07-01“…To shed light on this problem, we genetically dissected an environment-specific poor growth phenotype in a cross of two budding yeast strains. This phenotype is detectable when certain segregants are grown on ethanol at 37°C ('E37'), a condition that differs from the standard culturing environment in both its carbon source (ethanol as opposed to glucose) and temperature (37°C as opposed to 30°C). …”
Get full text
Article -
1124
Diagnostic Possibilities of Optical Coherent Tomography of the Retina during Compression in the Chiasm-Sellar Region
Published 2020-04-01“…The results of literature sources’s analysis are summarized in the table by the parameters studied, the OCT model; etiology, treating methods and the results of the OCT study. …”
Get full text
Article -
1125
A Systematic Search for Candidate Supermassive Black Hole Binaries Using Periodic Mid-infrared Light Curves of Active Galactic Nuclei
Published 2024-01-01“…Notably, we find no overlap between our sample and optical periodic sources, which can be explained by a distinct preference for certain periods due to selection bias. …”
Get full text
Article -
1126
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1127
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1128
Green Chemistry Method for Analyzing Bisphenol A in Milk
Published 2025-01-01“…A simple, fast, green, and sensitive method for determining Bisphenol A (BPA) levels in commercial milk was developed using a solventless sample preparation technique known as stir bar sorptive extraction, coupled with thermal desorption–gas chromatography/mass spectrometry. BPA was selected due to its ubiquitous presence in the environment and its classification as an endocrine-disrupting chemical of concern (i.e., its ability to mimic hormone functions). …”
Get full text
Article -
1129
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
1130
Does tinnitus and emotional distress influence central auditory processing? A comparison of acute and chronic tinnitus in normal-hearing individuals.
Published 2025-01-01“…<h4>Design</h4>This study compared the auditory afferent and efferent functions of normal-hearing patients with acute tinnitus, chronic tinnitus, and control group using gap detection test, the Mandarin Hearing in Noise Test (MHINT), and contralateral suppression of transient evoked otoacoustic emissions (TEOAEs).…”
Get full text
Article -
1131
Urinary Exosomes
Published 2009-01-01“…Thus, UE have valuable potential as a source of biomarkers for early detection of various types of diseases, monitoring the disease evolution and/or response to therapy. …”
Get full text
Article -
1132
Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design
Published 2024-12-01“…The first of its kind, it leverages three distinct but complementary frameworks to support a user-centric and context-sensitive, post-hoc explanation for fraud detection. Using the principles of scenario-based design, it amalgamates two independent real-world sources to establish a realistic card fraud prediction scenario. …”
Get full text
Article -
1133
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
1134
Research on Multipoint Leak Location of Gas Pipeline Based on Variational Mode Decomposition and Relative Entropy
Published 2020-01-01“…Pipeline leak detection has always been a relatively difficult technical problem; especially in urban pipeline leak detection, there are still many problems to be solved. …”
Get full text
Article -
1135
Investigation of the Impact of Light Colour on Surface Colour Perception: A Case Study on Red Surfaces
Published 2025-07-01“…These results offer valuable insights for the selection of suitable light sources not only for art exhibition spaces but also for other environments featuring colourful objects. …”
Get full text
Article -
1136
Numerical modeling of complex radiative heat transfer
Published 2017-12-01“…The application of numerical simulation of the fine structure of the absorption and emission in the complex problems of radiative heat transfer is consider when the structural characteristics of the environment and the boundary conditions are different strong inhomogeneities in temperature, chemical composition and distribution of the radiation sources. The very nature of radiative heat transfer and temperature variation trends over time are determined by the acute effects of selection of the spectra and their modeling require knowledge of spectral line parameters: intensity, half-width position of the centers, contours. …”
Get full text
Article -
1137
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
1138
Impact of health literacy in patients with chronic musculoskeletal disease--systematic review.
Published 2012-01-01“…We assessed risk of bias from participant selection, methods of measuring health literacy and functional outcomes, missing data, and potential for confounding.…”
Get full text
Article -
1139
Venous Thromboembolism Prophylaxis in Intensive Care Units (Review)
Published 2020-07-01“…VTE is common and potentially life-threatening in patients admitted to ICU, even in spite of preventive care.The purpose of the review is to justify the necessity of preventive care for venous thromboembolism in ICU patients.From over 300 initially selected sources of literature databases (Scopus, Web of science, RSCI, etc.), 99 sources were chosen including 69 that were published during the last five years (2015-2020). …”
Get full text
Article -
1140
Practical Implementation of a Smart Home Model Using Arduino and Sensors
Published 2025-05-01“…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
Get full text
Article