Showing 66,141 - 66,160 results of 81,006 for search 'AT*', query time: 0.33s Refine Results
  1. 66141

    N‐terminal pro brain natriuretic peptide reference values in community‐dwelling older adults by Ulrike Braisch, Wolfgang Koenig, Dietrich Rothenbacher, Michael Denkinger, Nele Friedrich, Stephan B. Felix, Till Ittermann, Marcus Dörr, Dhayana Dallmeier

    Published 2022-06-01
    “…Identifying URL in those ≥80 years remains complex. Our results attempt to provide a frame for the further investigation of age‐specific NT‐proBNP cut‐offs in older adults. …”
    Get full text
    Article
  2. 66142

    Climatic Trends in Hail Precipitation in France: Spatial, Altitudinal, and Temporal Variability by Lucía Hermida, José Luis Sánchez, Laura López, Claude Berthet, Jean Dessens, Eduardo García-Ortega, Andrés Merino

    Published 2013-01-01
    “…Association Nationale d’Etude et de Lutte contre les Fléaux Atmosphériques (ANELFA) installed hailpad networks in the Atlantic and Midi-Pyrénées regions of France. …”
    Get full text
    Article
  3. 66143

    Surface morphology, magnetic resonance and antistatic properties of fabric with carbon coating, modified by metal clusters by A. G. Anisovich, I. P. Akula, A. P. Laskovnev, M. I. Markevich, N. M. Chekan

    Published 2020-10-01
    “…This is corresponds to carbon coating clusters.From the ratio of the signal intensities of the filled resonator and the calibration sample, it follows that the non-resonant absorption of the microwave electromagnetic field in the system is slightly attenuated.…”
    Get full text
    Article
  4. 66144

    Physiology-informed use of Cupriavidus necator in biomanufacturing: a review of advances and challenges by Michael Weldon, Christian Euler

    Published 2025-01-01
    “…This autotrophic metabolism potentially makes chemical production using C. necator sustainable and attractive for biomanufacturing. Additionally, C. necator natively fixes carbon in the form of poly-3-hydroxybutyrate, which can be processed to make biodegradable plastic. …”
    Get full text
    Article
  5. 66145

    STUDI POLA INTERAKSI PERILAKU JANGKRIK (Gryllus bimaculatus ) JANTAN DAN BETINA by Anwari Adi Nugroho, Namira Hanin Sal Sabilla, Dwi Setyaningrum, Fikih Putri Prastin, Talila Rima Dani

    Published 2020-05-01
    “…The results showed that the behavior that is often performed by crickets is sounding, eating, climbing, mating and attacking other crickets. Crickets perform sounding behavior to attract the attention of female crickets, show their existence and to defend their territory and food sources. crickets also often climb, to escape from the container because crickets want to live freely. …”
    Get full text
    Article
  6. 66146

    Vision-Based Underwater Docking Guidance and Positioning: Enhancing Detection with YOLO-D by Tian Ni, Can Sima, Wenzhong Zhang, Junlin Wang, Jia Guo, Lindan Zhang

    Published 2025-01-01
    “…Pool experiments verified the feasibility of the method, achieving a 90% success rate for single-attempt docking and recovery. The proposed approach offered an accurate and efficient solution for underwater docking guidance and target detection, which is of great significance for improving the safety of docking.…”
    Get full text
    Article
  7. 66147

    IDH Mutant Cholangiocarcinoma: Pathogenesis, Management, and Future Therapies by Alexander Bray, Vaibhav Sahai

    Published 2025-01-01
    “…As a result, pharmacologic inhibition of mIDH has become an attractive therapeutic strategy in CCAs harboring this mutation. …”
    Get full text
    Article
  8. 66148

    Comparative analysis of neural network models performance on low-power devices for a real-time object detection task by A. Zagitov, E. Chebotareva, A. Toschev, E. Magid

    Published 2024-04-01
    “…A computer vision based real-time object detection on low-power devices is economically attractive, yet a technically challenging task. The paper presents results of benchmarks on popular deep neural network models, which are often used for this task. …”
    Get full text
    Article
  9. 66149

    Studying gender in the experiences of patients with heart failure: A scoping review of qualitative studies and methodological recommendations by Elias Thomas, Petra Verdonk, Jeanine Roeters-van Lennep, Hanneke Rhodius-Meester, Louis Handoko, Linda Schoonmade, Majon Muller, Maaike Muntinga

    Published 2025-01-01
    “…This led to results and conclusions which were drawn along binary lines – representing gender as two separate, oppositional and mutually exclusive categories, and paying little attention to the dynamic, relational and context-dependent aspects of gender. …”
    Get full text
    Article
  10. 66150

    Privacy and Biometric Passports by Ioannis Vakalis

    Published 2011-01-01
    “…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
    Get full text
    Article
  11. 66151

    Who’s afraid of Dura Mater? by Mario Emilio Zernotti, Javier Gavilán

    Published 2025-05-01
    “…This position cannot be used in patients with radical cavities and should not be used in patients with aural atresia to avoid complications of future ear reconstructive surgery. …”
    Get full text
    Article
  12. 66152

    The Merrifield-Simmons Index and Hosoya Index of C(n,k,λ) Graphs by Shaojun Dai, Ruihai Zhang

    Published 2012-01-01
    “…By C(n,k,λ) we denote the set of graphs with n vertices, k cycles, the length of every cycle is λ, and all the edges not on the cycles are pendant edges which are attached to the same vertex. In this paper, we investigate the Merrifield-Simmons index i(G) and the Hosoya index z(G) for a graph G in C(n,k,λ).…”
    Get full text
    Article
  13. 66153
  14. 66154

    Tackling Disinformation Through Public Administration Recommendations –The Czech Experience by Tomáš Svoboda

    Published 2024-11-01
    “…Originality/Value: The topic can be considered novel, given the limited attention it has received in the literature. This is especially true for national literature (in the case of the Czech background on which the text is primarily based). …”
    Get full text
    Article
  15. 66155

    A relevância dos limites discricionários do juiz generalista by Igor de Lazari, Carlos Bolonha, Henrique Rangel

    “…O Brasil traz exemplos de grande influência na atividade judiciária como as súmulas, os enunciados e as súmulas vinculantes. …”
    Get full text
    Article
  16. 66156

    Aerosol-Precipitation Interactions over India: Review and Future Perspectives by S. Ramachandran, S. Kedia

    Published 2013-01-01
    “…Atmospheric aerosols can interact with clouds and influence the hydrological cycle by acting as cloud condensation nuclei. …”
    Get full text
    Article
  17. 66157

    Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 by Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG

    Published 2022-12-01
    “…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
    Get full text
    Article
  18. 66158

    Synthesis and structure elucidation of some novel thiophene and benzothiophene derivatives as cytotoxic agents by Mohareb Rafat M., Abdallah Amira E. M., Helal Maher H. E., Shaloof Somiya M. H.

    Published 2016-03-01
    “…Attempting to produce cyclized systems with potential anti-proliferative activity, a series of novel thiophene and benzothiophene derivatives were designed and synthesized. …”
    Get full text
    Article
  19. 66159

    Toxicological impact of rabeprazole and evaluation of toxic effects on the plant-based eukaryotic test models by Muhammad Torequl Islam, Marcello Iriti, Hicham Harhar, Youssef Elouafy, Imane Chamkhi, Eda Sönmez Gürer, Javad Sharifi-Rad

    Published 2024-09-01
    “…Chronic exposure to RPZ has also been associated with significant biochemical and hematological alterations, as well as various toxicological effects such as hypergastrinemia, hyperplasia, atrophy of gastric glands, gastric anti-secretory effect, and hypochlorhydria. …”
    Get full text
    Article
  20. 66160

    Reformas de la Constitución bonaerense y debates en torno al estatus de la Iglesia católica y la religión (1989-1994) by Mariano Fabris, Marcela Ferrari

    Published 2022-01-01
    “…Este artículo analiza dos reformas constitucionales de la provincia de Buenos Aires, la de 1989-1990 y la aprobada en 1994, en un sentido general, a la luz de los cambios institucionales que propusieron en relación con las experiencias previas y los desafíos político-sociales del presente y, en otro específico, con respecto a los debates y las cuestiones atinentes al estatus de la Iglesia y la religión católica. …”
    Get full text
    Article