Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- methods 3
- Economics 2
- Health and hygiene 2
- History 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Religious life 2
- Women 2
- Academic writing 1
- Administration 1
- Advertising 1
- Anesthesia 1
- Anesthesiology 1
- Application software 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Attitudes 1
- Big data 1
- Biochemical Phenomena 1
- Biochemistry 1
- Cave ecology 1
- Christian men 1
- Christian sociology 1
- Christian women 1
- Christianity 1
- Climate Change 1
- Clinical biochemistry 1
- Consumers 1
-
9261
Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation
Published 2025-01-01“…However, several challenges, including the availability of relevant, labeled, high‐quality datasets, data privacy concerns, model interpretability, and algorithmic bias, must be carefully managed. …”
Get full text
Article -
9262
Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures
Published 2025-02-01“…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
Get full text
Article -
9263
The First Record of an Aggressive Form of Ocular Tumour Enhanced by Marek’s Disease Virus Infection in Layer Flock in Al-Najaf, Iraq
Published 2024-01-01“…In the presented study, the positive samples of ocular tumour were 168 out of 282 MD positive samples, which accomplished in farm suffered from an unexpectedly high mortality rate. We investigated a rapidly developed tumour mass that was observed in an MD-vaccinated layer flock that showed obvious clinical signs of MD, accompanied by forming a small lump in one eye at age 21 weeks, which developed to a big lump at week 28 of age, leading to death. …”
Get full text
Article -
9264
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
Get full text
Article -
9265
Surgical Excision and Radiotherapy for Giant Keloids in Auricula: A Case Report
Published 2025-01-01“…A combined way of doing surgery and giving radiotherapy showed it could work well for handling big ear keloids and keeping them from coming back. …”
Get full text
Article -
9266
-
9267
Was Aristotle right about moral decision-making? Building a new empirical model of practical wisdom.
Published 2025-01-01“…Phronesis also correlated with Big 6 and Dark Tetrad personality traits, moral disengagement, and Moral Foundations in expected directions. …”
Get full text
Article -
9268
A Novel Complex Event Processing Engine for Intelligent Data Analysis in Integrated Information Systems
Published 2016-03-01“…Although Complex Event Processing (CEP) has enhanced the capacity of data analysis in information systems, it is still a big challenging task since events are rapidly increasing in diverse applications. …”
Get full text
Article -
9269
Deep Learning and Wavelet Transform Combined With Multichannel Satellite Images for Tropical Cyclone Intensity Estimation
Published 2025-01-01“…Tropical cyclone (TC) is a highly catastrophic weather event, and accurate estimation of intensity is of great significance. …”
Get full text
Article -
9270
Confidence intervals for the COVID-19 neutralizing antibody retention rate in the Korean population
Published 2020-09-01“…Due to the sparsity of data, the estimation of confidence interval is a big challenge. Thus, we consider several confidence intervals using Asymptotic, Exact and Bayesian estimation methods. …”
Get full text
Article -
9271
Effect of Astaxanthin on Immune Function and Myocardial Injury in Mice with Chronic Sleep Deprivation
Published 2024-12-01Get full text
Article -
9272
Brain state forecasting for precise brain stimulation: Current approaches and future perspectives
Published 2025-02-01“…Subsequently, we will review the evidence in favour of data-driven forecasting and discuss its potential contributions to TMS methodology and the scientific understanding of brain dynamics, highlighting the transformative potential of big open datasets.…”
Get full text
Article -
9273
Bio-primed machine learning to enhance discovery of relevant biomarkers
Published 2025-02-01“…Abstract Precision medicine relies on identifying reliable biomarkers for gene dependencies to tailor individualized therapeutic strategies. The advent of high-throughput technologies presents unprecedented opportunities to explore molecular disease mechanisms but also challenges due to high dimensionality and collinearity among features. …”
Get full text
Article -
9274
Advancing Sustainable Development Goals through Earth Observation Satellite Data: Current Insights and Future Directions
Published 2025-01-01“…Earth observation (EO) satellites have become essential tools in advancing these goals, providing high-frequency, extensive data for tracking environmental changes, assessing ecosystem health, and supporting resource management. …”
Get full text
Article -
9275
FROM HIGH ASPIRATIONS TO HARSH REALITY: EU HUMAN RIGHTS PROMOTION AT THE UN HUMAN RIGHTS COUNCIL
Published 2018-02-01“…Since 1990s the EU has been highly aspirational on its role in human rights promotion on a global scale, which has led to the EU’s proactive participation in international organizations. …”
Get full text
Article -
9276
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
9277
Shedding light on DNA methylation and its clinical implications: the impact of long-read-based nanopore technology
Published 2024-12-01“…This is a big step forward for epigenomic studies, and unsolved questions regarding gene expression and transposable elements silencing through DNA methylation can now be answered.…”
Get full text
Article -
9278
Advanced R-GAN: Generating anomaly data for improved detection in imbalanced datasets using regularized generative adversarial networks
Published 2025-01-01“…The high prevalence of fraud in contemporary financial transactions necessitates advanced anomaly detection systems to address the significant imbalance between legitimate and anomalous transactions in real-time datasets. …”
Get full text
Article -
9279
Multiple Acrometastases in a Patient with Renal Pelvic Urothelial Cancer
Published 2017-01-01“…Radiation therapy and disarticulation of the left big toe at the metacarpal-phalangeal joint were performed and his pain and hemorrhage were successfully controlled. …”
Get full text
Article -
9280
Drought risk management in agricultural sector with an emphasis on the socioeconomic dimension under Fuzzy Logic in the Sistan region
Published 2024-10-01“…Agriculture is an important sector for economic development in any society and country, so the development of this sector can be a big leap toward economic development. However, this sector is suffering from frequent droughts with extensive socioeconomic dimensions. …”
Get full text
Article