Suggested Topics within your search.
Suggested Topics within your search.
- History 7
- Atlases 6
- Human anatomy 6
- Social conditions 5
- methods 5
- Anesthesia 4
- Histology 4
- Women 4
- Atmospheric physics 3
- Attitude to Health 3
- Chemistry, Physical and theoretical 3
- Climatology 3
- Diseases 3
- Leadership 3
- Medicine 3
- Meteorology 3
- Politics and government 3
- atlases 3
- Behavioral Medicine 2
- Children 2
- Christianity 2
- Civilization 2
- Colonial influence 2
- Contracts 2
- Customer relations 2
- Customer services 2
- Cytodiagnosis 2
- Health 2
- Health and hygiene 2
- Manners and customs 2
-
66141
N‐terminal pro brain natriuretic peptide reference values in community‐dwelling older adults
Published 2022-06-01“…Identifying URL in those ≥80 years remains complex. Our results attempt to provide a frame for the further investigation of age‐specific NT‐proBNP cut‐offs in older adults. …”
Get full text
Article -
66142
Climatic Trends in Hail Precipitation in France: Spatial, Altitudinal, and Temporal Variability
Published 2013-01-01“…Association Nationale d’Etude et de Lutte contre les Fléaux Atmosphériques (ANELFA) installed hailpad networks in the Atlantic and Midi-Pyrénées regions of France. …”
Get full text
Article -
66143
Surface morphology, magnetic resonance and antistatic properties of fabric with carbon coating, modified by metal clusters
Published 2020-10-01“…This is corresponds to carbon coating clusters.From the ratio of the signal intensities of the filled resonator and the calibration sample, it follows that the non-resonant absorption of the microwave electromagnetic field in the system is slightly attenuated.…”
Get full text
Article -
66144
Physiology-informed use of Cupriavidus necator in biomanufacturing: a review of advances and challenges
Published 2025-01-01“…This autotrophic metabolism potentially makes chemical production using C. necator sustainable and attractive for biomanufacturing. Additionally, C. necator natively fixes carbon in the form of poly-3-hydroxybutyrate, which can be processed to make biodegradable plastic. …”
Get full text
Article -
66145
STUDI POLA INTERAKSI PERILAKU JANGKRIK (Gryllus bimaculatus ) JANTAN DAN BETINA
Published 2020-05-01“…The results showed that the behavior that is often performed by crickets is sounding, eating, climbing, mating and attacking other crickets. Crickets perform sounding behavior to attract the attention of female crickets, show their existence and to defend their territory and food sources. crickets also often climb, to escape from the container because crickets want to live freely. …”
Get full text
Article -
66146
Vision-Based Underwater Docking Guidance and Positioning: Enhancing Detection with YOLO-D
Published 2025-01-01“…Pool experiments verified the feasibility of the method, achieving a 90% success rate for single-attempt docking and recovery. The proposed approach offered an accurate and efficient solution for underwater docking guidance and target detection, which is of great significance for improving the safety of docking.…”
Get full text
Article -
66147
IDH Mutant Cholangiocarcinoma: Pathogenesis, Management, and Future Therapies
Published 2025-01-01“…As a result, pharmacologic inhibition of mIDH has become an attractive therapeutic strategy in CCAs harboring this mutation. …”
Get full text
Article -
66148
Comparative analysis of neural network models performance on low-power devices for a real-time object detection task
Published 2024-04-01“…A computer vision based real-time object detection on low-power devices is economically attractive, yet a technically challenging task. The paper presents results of benchmarks on popular deep neural network models, which are often used for this task. …”
Get full text
Article -
66149
Studying gender in the experiences of patients with heart failure: A scoping review of qualitative studies and methodological recommendations
Published 2025-01-01“…This led to results and conclusions which were drawn along binary lines – representing gender as two separate, oppositional and mutually exclusive categories, and paying little attention to the dynamic, relational and context-dependent aspects of gender. …”
Get full text
Article -
66150
Privacy and Biometric Passports
Published 2011-01-01“…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
Get full text
Article -
66151
Who’s afraid of Dura Mater?
Published 2025-05-01“…This position cannot be used in patients with radical cavities and should not be used in patients with aural atresia to avoid complications of future ear reconstructive surgery. …”
Get full text
Article -
66152
The Merrifield-Simmons Index and Hosoya Index of C(n,k,λ) Graphs
Published 2012-01-01“…By C(n,k,λ) we denote the set of graphs with n vertices, k cycles, the length of every cycle is λ, and all the edges not on the cycles are pendant edges which are attached to the same vertex. In this paper, we investigate the Merrifield-Simmons index i(G) and the Hosoya index z(G) for a graph G in C(n,k,λ).…”
Get full text
Article -
66153
A pathway for nurses from work strain to anger: mediation of social intelligence
Published 2025-01-01Get full text
Article -
66154
Tackling Disinformation Through Public Administration Recommendations –The Czech Experience
Published 2024-11-01“…Originality/Value: The topic can be considered novel, given the limited attention it has received in the literature. This is especially true for national literature (in the case of the Czech background on which the text is primarily based). …”
Get full text
Article -
66155
A relevância dos limites discricionários do juiz generalista
Get full text
Article -
66156
Aerosol-Precipitation Interactions over India: Review and Future Perspectives
Published 2013-01-01“…Atmospheric aerosols can interact with clouds and influence the hydrological cycle by acting as cloud condensation nuclei. …”
Get full text
Article -
66157
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
Published 2022-12-01“…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
Get full text
Article -
66158
Synthesis and structure elucidation of some novel thiophene and benzothiophene derivatives as cytotoxic agents
Published 2016-03-01“…Attempting to produce cyclized systems with potential anti-proliferative activity, a series of novel thiophene and benzothiophene derivatives were designed and synthesized. …”
Get full text
Article -
66159
Toxicological impact of rabeprazole and evaluation of toxic effects on the plant-based eukaryotic test models
Published 2024-09-01“…Chronic exposure to RPZ has also been associated with significant biochemical and hematological alterations, as well as various toxicological effects such as hypergastrinemia, hyperplasia, atrophy of gastric glands, gastric anti-secretory effect, and hypochlorhydria. …”
Get full text
Article -
66160
Reformas de la Constitución bonaerense y debates en torno al estatus de la Iglesia católica y la religión (1989-1994)
Published 2022-01-01“…Este artículo analiza dos reformas constitucionales de la provincia de Buenos Aires, la de 1989-1990 y la aprobada en 1994, en un sentido general, a la luz de los cambios institucionales que propusieron en relación con las experiencias previas y los desafíos político-sociales del presente y, en otro específico, con respecto a los debates y las cuestiones atinentes al estatus de la Iglesia y la religión católica. …”
Get full text
Article