Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5021
How to use monoclonal antibody-based therapy in ALL
Published 2025-06-01“…Acute Lymphoblastic Leukemia (ALL) represents a significant challenge in haematology, particularly due to its aggressive nature, high relapse rates in adults and toxicity of treatment. Over the past decade, monoclonal antibody (MoAb)-based therapies have emerged as a promising approach to target specific antigens on leukemic cells, offering higher specificity, reduced toxicity, and improved response rates. …”
Get full text
Article -
5022
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01“…The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. …”
Get full text
Article -
5023
Wav-audio steganography algorithm based on amplitude modifying
Published 2014-10-01“…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
Get full text
Article -
5024
Considerations for Building Climate-based Species Distribution Models
Published 2016-10-01“…WEC375/UW420: Considerations for Building Climate-based Species Distribution Models (ufl.edu) …”
Get full text
Article -
5025
Convolutional Neural Network-Based Fish Posture Classification
Published 2021-01-01“…Considering that in the actual situation, we only need to determine the four postures which are related to the head, tail, back, and belly of the fish, and we transfer this task into a four-kind classification problem. As such, the convolutional neural network (CNN) is introduced here to do classification and then to detect the fish’s posture. …”
Get full text
Article -
5026
Decentralized searchable encryption scheme based on dynamic accumulator
Published 2019-04-01“…Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.…”
Get full text
Article -
5027
A Memory-Based Hysteresis Model in Piezoelectric Actuators
Published 2012-01-01“…A mathematical memory-based model is proposed to capture the hysteresis behavior in piezoelectric actuators. …”
Get full text
Article -
5028
A novel platform for engineered AAV-based vaccines
Published 2025-03-01“…In conclusion, this novel AAV-based next-generation vaccine platform allows for the presentation of large antigenic sequences to elicit strong and specific immune responses. …”
Get full text
Article -
5029
Genetic Basis of Sjögren's Syndrome. How Strong is the Evidence?
Published 2006-01-01“…Genetic studies on twins with primary SS have not been performed, and only a few case reports describing twins have been published. …”
Get full text
Article -
5030
Deep Learning-Based Damage Assessment in Cherry Leaves
Published 2024-12-01“…Therefore, the primary objective of this study is to use deep learning-based disease detection applications to increase cherry production and enable early disease diagnosis. …”
Get full text
Article -
5031
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01“…A secure Windows platform solution based on TCM was proposed to solve the integrity measurement and attestation problem of the Windows system.Two security modes were realized by extending the Windows kernel:in the measurement mode,all executable contents that were loaded onto the Windows system were measured,and the TCM provided the protection and outward attestation for these measurements; and in the control mode,the measurements were further compared with a whitelist customized by an administrator,and all the programs that were not included in the whitelist would be prohibited from running.Experiment analysis shows that proposed solution can enhance the security of Windows platform and resist some software attacks; and at the same time,the average performance overhead is about 20~30ms,which will not influence the normal running of Windows.…”
Get full text
Article -
5032
Construction of multi-robot platform based on dobot robots
Published 2025-02-01“…Specifically, a computer sends data to the microcontroller inside the host through WiFi communication, then the host distributes data to the slaves. …”
Get full text
Article -
5033
Honeypot contract detection of blockchain based on deep learning
Published 2022-01-01“…Aiming at the problems of low accuracy of current detection methods and poor generalization of model, a honeypot contract detection method based on KOLSTM deep learning model was proposed.Firstly, by analyzing the characteristics of honeypot contract, the concept of key opcode was proposed, and a keyword extraction method which could be used to select the key opcode in smart contract was designed.Secondly, by adding the key opcode weight mechanism to the traditional LSTM model, a KOLSTM model which could simultaneously capture the sequence features and key opcode features hidden in the honeypot contract was constructed.Finally, the experimental results show that the model had a high recognition accuracy.Compared with the existing methods, the F-score is improved by 2.39% and 19.54% respectively in the two classification and multi-classification detection scenes.…”
Get full text
Article -
5034
Thermal conductivity of different bio-based insulation materials
Published 2021-06-01“… To achieve the zero-waste goal as well as sustainability, the use of the raw materials, especially those from nature, and wood in particular, has to be smart, meaning that the resource has to be used to its full potential. …”
Get full text
Article -
5035
Android malware detection based on improved random forest
Published 2017-04-01“…Aiming at the defect of vote principle in random forest algorithm which is incapable of distinguishing the differences between strong classifier and weak classifier,a weighted voting improved method was proposed,and an improved random forest classification (IRFCM) was proposed to detect Android malware on the basis of this method.The IRFCM chose Permission information and Intent information as attribute features from AndroidManifest.xml files and optimized them,then applied the model to classify the final feature vectors.The experimental results in Weka environment show that IRFCM has better classification accuracy and classification efficiency.…”
Get full text
Article -
5036
Real-Time Depth-Based Hand Detection and Tracking
Published 2014-01-01“…To determine the central point of a hand, we propose the so-called Depth Adaptive Mean Shift algorithm. DAM-Shift is a variant of CAM-Shift (Bradski, 1998), where the size of the search disk varies according to the depth of a hand. …”
Get full text
Article -
5037
BASES OF QUALITY MANAGEMENT OF GOODS BY AN ASSESSMENT OF LOYALTY OF THE CONSUMER
Published 2016-03-01“…Such fundamental categories as norm and mass of potrebitelny cost, a consumer assessment, quality and the range allow to reveal degree of satisfaction of the client. …”
Get full text
Article -
5038
IoT business guarantee method based on behavioral portrait
Published 2021-05-01“…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
Get full text
Article -
5039
A bidirectional authentication protocol for RFID based on Syn
Published 2018-12-01“…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
Get full text
Article -
5040
Distributed dynamic mapping scheme based on cost function
Published 2014-10-01“…For supporting efficient host mobility and mapping identifiers onto locators,a distributed dynamic mobility mapping scheme based on cost function was proposed.In the scheme,depending on the mobility pattern and communication feature,the communication of mobile node is divided into three communication models,namely,moving update model,balanced transmission model and resolving query model.In order to minimize the total resolving cost,three mapping approach are proposed based on distributed multicast,consistent hash functions and proactive sharing respectively in the mobile domain.For each mapping approach,corresponding registration update,resolution query and packet delivery strategies are designed.Simulation results show that the scheme can achieve the minimum resolving cost,and can have low resolve latency and good adaptability for network topology dynamic changing.…”
Get full text
Article