Suggested Topics within your search.
Suggested Topics within your search.
-
901
Antibiotics and Antimicrobial Resistance Genes in a Gut Microbiota as a Reservoir—A Review
Published 2025-01-01“…This emphasizes how important it is that we understand how the human body functions on the inside as well as the outside sources of infections. …”
Get full text
Article -
902
Significance of the pineal gland hormone melatonin in maintaining the health of women of reproductive age (a review)
Published 2020-01-01“…In our search, we prioritized the free access to full text articles. The selection of sources was limited to the period from 2012 to 2019.Results. …”
Get full text
Article -
903
An Emergency Response Framework Design and Performance Analysis for Ship Fire Incidents in Waterway Tunnels
Published 2025-07-01“…The framework is mapped into a Petri net model encompassing three key stages: detection and early warning, emergency response actions, and recovery. …”
Get full text
Article -
904
Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine
Published 2025-03-01“…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
Get full text
Article -
905
Urban Hierarchy Migration Model and Impact Mechanism of Graduates Admitted to the Guangdong Provincial Civil Service Examination
Published 2025-02-01“…Compared to other non-establishment employment models, this employment model has a stronger possibility of migrating down the urban hierarchy, which may be caused by significant differences in the sources of job settings, competition intensity, and subjective willingness. …”
Get full text
Article -
906
-
907
The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA
Published 2020-01-01“…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
Get full text
Article -
908
-
909
Battery Energy Storage System Placement And Sizing In Distribution Networks
Published 2024-01-01“…The methodology is applicable to BESS which implement the functions of ensuring the reliability of power supply to consumers (use of BESS as a backup or emergency source of power supply), as well as the function of regulating voltage levels in the electrical network (regulating reactive power by the BESS inverter).…”
Get full text
Article -
910
An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II
Published 2025-04-01“…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
Get full text
Article -
911
Cryopreservation and culture strategies for testicular tissue and cells in small and large animals
Published 2025-07-01“…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
Get full text
Article -
912
-
913
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
914
Metaphorics and intertexts in the key text positions of political media discourse
Published 2022-07-01“…The study examines various ways that serve to intensify and improve precedent phenomena used as a source-sphere in translating the author’s axiological space and shaping vectors of interpretation for political articles metatext.The headline is a brief representation of objective and reflexive prognostics, which steers the “correct” perception of the entire text. …”
Get full text
Article -
915
Developing a Comprehensive Physical Education Curriculum in Secondary Schools: Identifying and Exploring the Key Components of Content
Published 2022-12-01“…A systematic review of relevant literature was conducted using publications from the Vernadskyi National Library and sources in the Google search system. Keywords were used for the search in accordance with the topic of the study, and 26 sources were selected for analysis. …”
Get full text
Article -
916
A thorough assessment of 10-MDP primers in modern dental adhesive systems
Published 2024-09-01“…We focus on its chemistry, interactions with tooth substrates, interactions with zirconium and other metals, adhesive’s longevity, clinical applications, and potential drawbacks. Sources: Our sources are the Internet, such as Google Scholar and PubMed. …”
Get full text
Article -
917
A Review on Flavonoids as a Potential Biomolecule for Inhibiting the Effect of Head and Neck Cancer
Published 2024-01-01“…Results: Plants have been major sources of flavonoids but fungi, especially endophytic fungi are also valuable sources of natural therapeutic agent flavonoids. …”
Get full text
Article -
918
Harmonic State Estimation Method Based on Bayesian Optimized Elastic Network Regression
Published 2022-08-01“…Firstly, when the least square method is used to estimate the harmonic state, the weighted 1-norm and 2-norm are added to the penalty function at the same time; In addition, in order to estimate the harmonic state more efficiently and accurately, the Gaussian process and Bayesian optimization are applied to select the weight of 1-norm and 2-norm; Finally, the effectiveness of the proposed method is verified in IEEE14 node. …”
Get full text
Article -
919
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
920
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article