Search alternatives:
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
-
861
Complexity of immunobiology of tumor necrosis factor and novel anti-TNF therapy
Published 2023-06-01“…Systemic anti-cytokine therapy is known to be accompanied by undesirable side effects, which can hypothetically be explained by the neutralization of these protective functions. Thus, we developed prototypes of TNF blockers which limit the bioavailability of this cytokine only from its main “pathogenic” source – myeloid cells. …”
Get full text
Article -
862
Leveraging Blockchain Technology With Enhanced MDSVA for Robust Meteorological Sensor Data Validation
Published 2025-01-01“…Our enhanced MDSVA introduces a sophisticated five-component validation function that simultaneously addresses drift and noise compensation, environmental adaptation, periodic variations, dynamic thresholds, and transient adjustments. …”
Get full text
Article -
863
LeafDPN: An Improved DPN Model for the Identification of Bacterial Blight in Soybean in Natural Environments
Published 2024-12-01“…<i>glycinea</i>, is one of the most devastating diseases in soybean with significant yield losses ranging from 4% to 40%. The timely detection of BBS is the foundation for disease control. …”
Get full text
Article -
864
Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol
Published 2025-07-01“…The RL-based mechanism continuously adapts decision-making by learning from system states, prioritizing transactions, and dynamically resolving conflicts using a reward function that accounts for key performance parameters, including the number of conflicting transactions, cost of aborting transactions, temporal validity constraints, and system resource utilization. …”
Get full text
Article -
865
Assessing chronic obstructive pulmonary disease risk based on exhalation and cough sounds
Published 2025-07-01“…Following this, each individual completed pulmonary function tests and participated in questionnaire surveys. …”
Get full text
Article -
866
Mitochondrial genome of Lonicera macranthoides: features, RNA editing, and insights into male sterility
Published 2025-01-01Get full text
Article -
867
High-Voltage CVT Fault Diagnosis Based on Effective Data Recognition and Multi-dimensional Information Fusion
Published 2025-05-01“…In view of the poor identification of the effective data in online monitoring of high-voltage capacitor voltage transformer (CVT), this paper proposes a method for effective data identification based on the analysis of data correlation coefficients, with utilization of the data characteristics that multiple online monitoring data sources exhibit linear correlation. To address the prevalent problem in current high-voltage CVT fault diagnosis, such as limited information sources, poor accuracy, and significant interference in partial discharge devices leading to compromised fault signal detection and accuracy, a fault diagnosis method based on multi-dimensional information fusion is proposed. …”
Get full text
Article -
868
Identification of key genes associated with mesocotyl length through a genome-wide association study in rice
Published 2025-05-01“…In this study, 300 rice germplasm resources with a wide range of sources were selected as experimental materials. …”
Get full text
Article -
869
Specific performance of IDT edge fingers
Published 2014-05-01“…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
Get full text
Article -
870
Identification of multiple power quality disturbances in hybrid microgrid using deep stacked auto-encoder based bi-directional LSTM classifier
Published 2025-03-01“…In recent years microgrid technology has created widespread interest for the integration of renewable energy sources into main utility grid to supply clean energy to the end users. …”
Get full text
Article -
871
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
872
Bovine PMN responses to extracellular vesicles released by Besnoitia besnoiti tachyzoites and B. besnoiti-infected host cells
Published 2024-12-01“…Therefore, we tested whether exposure of bovine PMN to EVs from different cellular sources affects classical PMN effector functions and cytokine/chemokine secretion. …”
Get full text
Article -
873
Synergizing Multi-Temporal Remote Sensing and Systemic Resilience for Rainstorm–Flood Risk Zoning in the Northern Qinling Foothills: A Geospatial Modeling Approach
Published 2025-06-01“…This framework quantitatively evaluates the nonlinear response mechanisms of town–village systems to flood disasters, emphasizing the synergistic effects of spatial scale, morphology, and functional organization. The proposed framework uniquely integrates three innovative modules: (1) a hybrid risk identification engine combining normalized difference vegetation index (NDVI) temporal anomaly detection and spatiotemporal hotspot analysis; (2) a morpho-functional resilience quantification model featuring a newly developed spatial morphological resilience index (SMRI) that synergizes landscape compactness, land-use diversity, and ecological connectivity through the entropy-weighted analytic hierarchy process (AHP); and (3) a dynamic scenario simulator embedding rainfall projections into a coupled hydrodynamic model. …”
Get full text
Article -
874
Mobile phone encryption as an obstacle in criminal investigation: Review of comparative solutions
Published 2021-01-01“…In detecting criminal offences, the police increasingly rely on electronic evidence. …”
Get full text
Article -
875
Effect of PM2.5 exposure on susceptibility to allergic asthma in elderly rats treated with allergens
Published 2025-02-01Get full text
Article -
876
Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method
Published 2023-01-01“…This research works in the field of money laundering detection from real bank data. Banking data analysis is a complex process that involves information gathered from various sources, mainly in terms of personality, such as bills or bank account transactions which have qualitative characteristics such as the testimony of eyewitnesses. …”
Get full text
Article -
877
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
878
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
879
Motivation and stimulation of employment specialists in the sphere of information technologies
Published 2016-04-01“…In conducting this study the main sources of raw data served as the information contained in scientific, reference, periodical literature on the subject in question, including the sources of information and telecommunications network "Internet". …”
Get full text
Article -
880
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article