Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
selection » detection (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
selection » detection (Expand Search)
-
1461
-
1462
Evaluation of Baby Leaf Products Using Hyperspectral Imaging Techniques
Published 2025-07-01Get full text
Article -
1463
Precision medicine in premature ovarian insufficiency: a focus on the precision therapeutic strategies for mesenchymal stem cells
Published 2025-07-01“…Key issues include the selection of appropriate MSCs sources, the optimization of culture conditions, and the determination of optimal transplantation protocols (encompassing dosage, administration route, and timing), all of which pose significant barriers to clinical translation of MSCs. …”
Get full text
Article -
1464
-
1465
Managing Friends and Foes: Sanctioning Mutualists in Mixed‐Infection Nodules Trades off With Defense Against Antagonists
Published 2025-01-01“…However, these outcomes may be difficult to achieve simultaneously, since plant defenses activated in response to antagonists can compromise mutualism function, and plant resources allocated to defense may trade off with resources allocated to managing mutualists. …”
Get full text
Article -
1466
Soil-Water Characteristic Curve Model Based on Particle Size Distribution and Pellicular Water
Published 2025-05-01Get full text
Article -
1467
FXYD2 marks and regulates maturity of β cells via ion channel-mediated signal transduction
Published 2025-06-01“…These results suggest that FXYD2 marks and regulates human β cell maturation via channel-sensing signal transduction and that it can be used as a selection marker for functional heterogeneity of stem cell derived human islet organoids.…”
Get full text
Article -
1468
Analyzing the Impact of Macro-Economic Factors and Taxation Manoeuvre on Federal Budget Revenues in the Russian Federation
Published 2018-12-01“…The authors use the integral factor analysis of the absolute growth in federal budget revenues in Russia in assumption of simultaneous changes in factors on the indicator function. Conventional methods of determinate factor analysis, including the method of chain substitution imply successive change in factors. …”
Get full text
Article -
1469
Detection Model for 5G Core PFCP DDoS Attacks Based on Sin-Cos-bIAVOA
Published 2025-07-01Get full text
Article -
1470
Genotyping from targeted NGS data based on a small set of SNPs correctly matches patient samples
Published 2025-07-01“…In two cohorts of totally 1441 patients with sequential samples, we could identify 3 sample swaps, 7 mislabelled samples (3 externally and 4 internally) and 1 mistake of unknown origin. We provide an R function for automated detection of sample swaps and mislabelling to the community as a free and open-source tool.…”
Get full text
Article -
1471
A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye
Published 2022-12-01“…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
Get full text
Article -
1472
The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan...
Published 2022-03-01“…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
Get full text
Article -
1473
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
1474
A directed greybox fuzzer for windows applications
Published 2025-07-01“…Abstract Directed greybox fuzzing (DGF) has proven effective in vulnerability discovery, but most efforts focus on the Linux platform, with substantially less attention devoted to Windows platform due to its closed-source and GUI software nature. This paper proposes WinDGF, a novel directed greybox fuzzer for Windows applications that addresses challenges including target function localization in persistent testing, GUI bypassing, and fitness metric calculation. …”
Get full text
Article -
1475
CHARTER OF THE STAVROPOL KRAI: PROBLEM ISSUES AND SEARCH FOR SOLUTION
Published 2021-09-01“…The interpretation of the source of the government of the Stavropol Krai, which is the people of the Stavropol Kraias part of the multinational people of the Russian Federation, has been proposed. …”
Get full text
Article -
1476
Prevalence and determinants of restrictive lung disorder among quarry workers at the Umuoghara quarry site, Ebonyi State, Nigeria: a cross-sectional study
Published 2025-01-01“…Data was collected using a pre-tested semi-structured questionnaire among 300 quarry workers selected by simple random sampling method. Lung function test was performed using a spirometer- spirovit SPI schiller and data was analyzed with the use of IBM SPSS version 23.0. …”
Get full text
Article -
1477
The Techniques of Influencing the Addressee in the Business Letters of Khan Ayuka on “Todo Bichig” (“Clear Letter”) and their Reflection in the Synchronized Russian Translations of...
Published 2024-12-01“…For this work, only those letters from the specified period have been selected that have preserved a synchronized translation into Russian. …”
Get full text
Article -
1478
Systemic model of segregation and transformation of urban solid waste
Published 2025-07-01“…These values were adjusted to a probability distribution function and expressed in state, flow and auxiliary equations, to explain and predict their behavior. …”
Get full text
Article -
1479
COMPLEX FOR MONITORING OF SEWAGE OPTICAL DENSITY CHANGES
Published 2018-03-01“…For carrying out an experiment water pollution is selected by vegetable oil. The analysis of absorption spectra of water and vegetable oil showed that as a source of radiation it is expedient to use lasers with lengths of waves in the range of 0,4–0,5 μm which have the minimum absorption of radiation in the water environment and the considerable absorption in the environment of impurity, for example, the violet STLL-MM-405-200-52-A laser with wavelength of 0,405 μm and 200 mW. …”
Get full text
Article -
1480
Growth and Form Trait Variation Analysis Among Different Clones of Michelia chapensis
Published 2025-04-01“…【Objective】The study was aimed at the screening of superior germplasmls of Michelia chapensis with an objective to lay a foundation of the selection and breeding project of this species.【Method】A total of 213 M. chapensis grafted clones derived from different regions of Guangdong, Hunan, Jiangxi were tested in National Forest Tree Germplasm Resource Bank of Magnoliaceae of Longshan in Guangdong (China) for their growth performance and form traits. …”
Get full text
Article