-
881
JASBO: Jaya Average Subtraction Based Optimization with Deep Learning Model for Multi-Classification of Infectious Disease from Unstructured Data
Published 2024-10-01“…Medical documents are considered an essential source for modern, invented, and robust analysis methods for accurate infection diagnoses. …”
Get full text
Article -
882
Spatial Pattern and Evolutionary Characteristics of Settlements in Dianchi River Basin from the Perspective of Toponymy
Published 2025-04-01“…By constructing a coupling analysis framework of toponym semantics and spatial attributes, this research confirms the “spatio-temporal code” function of toponym in the process reconstruction of human settlements, and the capability to analyze multi-source heterogeneous data based on the aforesaid function provides a new analytical methodology for the research on watershed human settlements. …”
Get full text
Article -
883
Real-Time, Risk-Based Clinical Trial Quality Management in China: Development of a Digital Monitoring Platform
Published 2025-04-01“…ConclusionsIn clinical practice, our tool would enable the automated monitoring and detection of risk points throughout all clinical trial stages; accurately identify the most relevant trial procedure and function line; and notify quality management personnel, in real time, to take prompt actions and dynamically prevent the recurrence of quality issues.…”
Get full text
Article -
884
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
885
MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations.
Published 2024-05-01“…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
Get full text
Article -
886
A Hidden Pulse: Uncovering a New Timing Signal in Cygnus X-1 with AstroSat
Published 2025-01-01“…This dip in coherence, which we detect for the first time in Cygnus X-1 at energies above 3 keV, appears in a state in which the source shows high-amplitude radio variability and significant hard X-ray polarization. …”
Get full text
Article -
887
Harnessing evanescent photoacoustic waves for multi-domain imaging
Published 2025-06-01“…Leveraging these features, we develop a proof-of-concept for supercritical angle photoacoustic microscopy (SA-PAM), which utilizes evanescent PA waves to enable new PAM functionalities, such as surface topography reconstruction and edge detection. …”
Get full text
Article -
888
Effect of PM2.5 exposure on susceptibility to allergic asthma in elderly rats treated with allergens
Published 2025-02-01Get full text
Article -
889
Structural Repetition Detector for multi-scale quantitative mapping of molecular complexes through microscopy
Published 2025-07-01“…Understanding these structures provides insights into their functional roles. While super-resolution microscopy can visualise such patterns, manual detection in large datasets is challenging and biased. …”
Get full text
Article -
890
Editorial
Published 2025-05-01“…Contributions on flexible antenna designs, mobile applications for dyslexic learners, and modified grey relational analysis further showcase how electronics and AI are increasingly embedded in daily societal functions. In Materials and Manufacturing Engineering, the research on MSW-derived biochar for iron production and voltage-induced void formation in boiler tubes exemplifies innovation in resource utilization and reliability of industrial systems. …”
Get full text
Article -
891
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
892
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
893
Life-threatening bleeding with intussusception due to gastrointestinal stromal tumor: a case report
Published 2019-10-01“…Abstract Background Massive intraluminal bleeding requires urgent intervention and management. However, the source of bleeding on the small intestine is difficult to determine. …”
Get full text
Article -
894
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
895
-
896
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
897
Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes
Published 2005-06-01“…As a plasma substitute clinical medicine uses perfluorane that is an antishock, antiischemic, and cardioprotective agent having a function of transferring O2 and CO2. The authors have investigated the interaction of perfluorane particles with human erythrocytic membranes. …”
Get full text
Article -
898
Baseline levels of microplastics in agricultural soils obscure the effects of additional microplastics from recycled fertilizers
Published 2025-07-01“…Whilst it was observed from the fluxes that digestate can be a substantial source of microplastics to soils, the comparatively short time of application and the high background at our investigated sites leads to a obscured effect where digestate inputs serve a limited function.…”
Get full text
Article -
899
Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset
Published 2025-06-01“…This dataset consists of 111,897 Solidity source code samples, ensuring the practical validation of the proposed approach. …”
Get full text
Article -
900
FAM3C Regulates Glioma Cell Proliferation, Invasion, Apoptosis, and Epithelial Mesenchymal Transition via the Notch Pathway
Published 2024-12-01“…Methods We utilized open‐source bioinformatics tools and platforms to analyze the transcriptional expression levels, prognosis, and correlation with clinical variables of FAM3C in gliomas, and subsequently, to hypothesize its potential molecular functions and possibly associated signaling pathways. …”
Get full text
Article