-
661
The Crosstalk between Myeloid Derived Suppressor Cells and Immune Cells: To Establish Immune Tolerance in Transplantation
Published 2016-01-01“…The review summarized recent research advances in this field and looked ahead at the research directions in the future.…”
Get full text
Article -
662
Methodology and Ethics of Citation A Critique on the Book Abd-ol-Hoseyn Zarinkoub’s Lectures of Literary Criticism
Published 2021-11-01“…This paper, in this regard, critics the book Abd–ol-Hoseyn Zarinkoub’s Lectures of Literary Criticism by Ahmad Khatami. One of the emphasized points in this article is the ambiguous boundary between the author’s speech and his sources. …”
Get full text
Article -
663
Forecasting-Aided Monitoring for the Distribution System State Estimation
Published 2020-01-01“…Aggregated active and reactive powers of small or medium enterprises and residential loads are simultaneously predicted by a one-step ahead forecast. The correlation between the forecasted real and reactive power errors is duly kept into account in the definition of the estimator together with the uncertainty of the overall measurement chain. …”
Get full text
Article -
664
Optimizing Nitrogen Management in Food and Energy Production and Environmental Protection: Summary Statement from the Second International Nitrogen Conference
Published 2001-01-01“…The Conference participants’ goal in the years and decades ahead is to encourage every country to make optimal choices about N management in food production and consumption, energy production and use, and environmental protection. …”
Get full text
Article -
665
Validating ICD-10 Diagnosis Codes for Guillain-Barré Syndrome in Taiwan’s National Health Insurance Claims Database [Letter]
Published 2025-01-01“…Harinto Nur Seha,1 Savitri Citra Budi,2 Ahmad Yani Noor,3 I Gusti Agung Ngurah putra Pradnyantara4 1Medical Record and Health Information Department, Poltekkes Permata Indonesia, Yogyakarta, Indonesia; 2Department of Health Information and Services, Vocational School, Universitas Gadjah Mada, Yogyakarta, Indonesia; 3Hospital Administration, Poltekkes Permata Indonesia, Yogyakarta, Indonesia; 4Medical Record and Health Information Department, STIKES Wira Medika, Bali, IndonesiaCorrespondence: Harinto Nur Seha, Poltekkes Permata Indonesia Yogyakarta, Jl. …”
Get full text
Article -
666
Path-Following Control of Wheeled Planetary Exploration Robots Moving on Deformable Rough Terrain
Published 2014-01-01“…An approach is proposed in which the reference path is generated according to the planned path by combining look-ahead distance and path updating distance on the basis of the carrot following method. …”
Get full text
Article -
667
The evolution of antifungal therapy: Traditional agents, current challenges and future perspectives
Published 2025-01-01“…Our review offers an overview of the antifungal drugs currently available for treatment, presents the status of new antifungal drugs under clinical study, and explores ahead to future candidates that aim to help address this important global health issue.…”
Get full text
Article -
668
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01“…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
Get full text
Article -
669
Drunkards and Singers: A Mongolian Battle of Sounds
Published 2016-12-01“…When I conducted fieldwork among the Darhad of northern Mongolia my informants repeatedly asserted that after a good singer’s performance even the most badly intoxicated lad stands still and keeps silent. …”
Get full text
Article -
670
A complex network traffic prediction method for IP network expansion applications
Published 2023-08-01“…., which brings difficulties to prediction.A prediction method for complex network traffic was proposed.It adopted an encode-decode structure, adding global features to the encoding layer, and combining global features and local features in the decoding layer to solve local uncertainties.The model used sample balance, normalization and other methods to extract the commonality of the data as much as possible to avoid the heterogeneity of the data.And emergencies were alleviated by increasing prior knowledge.The overall model had fewer parameters and had strong generalization performance, at the same time, the combination of artificial features and automatic features ensured the accuracy of the shallow network.The experimental results show that the proposed method has the characteristics of high accuracy and strong generalization performance.At present, this method has been applied on a large scale in engineering.…”
Get full text
Article -
671
Militares y Estado en Ecuador : ¿construcción militar y desmantelamiento civil?
Published 2006-09-01“…El artículo comienza con una descripción de las diferencias entre la llamada “Revolución Juliana”, y las propuestas planteadas en enero de 2000, durante el derrocamiento de Jamil Mahuad. Sigue con una revisión de los momentos clave para la construcción del Estado, desde 1925 hasta 1979, las políticas de desmantelamiento del Estado llevadas a cabo por las elites civiles desde la transición hacia la democracia en el último año mencionado, y las respectivas respuestas militares a recientes protestas sociales. …”
Get full text
Article -
672
ANSCHAUUNG KAVRAMI EKSENİNDE KANT FELSEFESİNİN TÜRKÇEYE ÇEVİRİSİNDE DİLSEL ÇOKLUK SORUNU
Published 2020-12-01“…Türkçedeki Kant çevirilerinde ve Kant üzerine yapılan akademik çalışmalarda dilsel bir birliğin olmayışı bu sahada yapılan çalışmaların muhatabı açısından birtakım zorluklara yol açmaktadır. …”
Get full text
Article -
673
Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Published 2022-12-01“…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
Get full text
Article -
674
A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
Published 2020-05-01“…Faced with changeful network demands,users have increasingly higher requirements for traditional network.Features such as flexibility,scalability and ease of use have become essential elements of modern network.A domain adaptive hybrid genetic algorithm (DAHGA) was proposed,which could be applied to the security service chain arrangement of cloud data center tenants,to achieve automatic loading and activation of tenant cloud security services and policies,to meet tenant cloud security “customization on demand” requirements.And conducts experimental comparison research on the effective placement efficiency of each VNF on the cloud security service chain orchestration was carried out,which fully validated the proposed algorithm.Effectiveness provides a reference and reference for the realization of cloud business non-destructive security service chain orchestration technology.…”
Get full text
Article -
675
La réception des conversations quotidiennes. Communication ordinaire et normativité sociale
Published 2016-12-01“…These accounts are telling us that the reception process is taking place ahead, in action and presence, and afterwards the conversation is held. …”
Get full text
Article -
676
Façonner des outils d’analyse pour étudier le changement institutionnel
Published 2014-02-01“…In order to adequately address the most pressing social and environmental challenges looming ahead, we need to develop analytical tools for analyzing dynamic situations – particularly institutional change. …”
Get full text
Article -
677
Użyteczność teorii Jonasa w rozstrzyganiu konkretnych problemów ekologicznych?
Published 2007-12-01“…Jonas shows both the continuity and special discontinuity of the human being within the domain of the livings However, he is not able to support his argument that the human being is the primary object of responsibility being ahead of other forms of organic life. Jonas ethical theory ought to include the specification of moral principles that will be useful for clarifying the matters that must be preserved and defended.…”
Get full text
Article -
678
The Bone Marrow Microenvironment as Niche Retreats for Hematopoietic and Leukemic Stem Cells
Published 2013-01-01“…Advancements in genetic engineering and microscopy have enabled us to critically deconstruct and analyze the anatomic and functional characteristics of these niches to reveal a wealth of new knowledge in HSC biology, which is quite ahead of LSC biology. In this paper, we examine the present understanding of the regulatory mechanisms governing HSC niches, with the goals of providing a framework for understanding the mechanisms of LSC regulation and suggesting future strategies for their elimination.…”
Get full text
Article -
679
Content Analysis of the Book “Teaching Methods of Arabic Language” Based on the Quality indicators of Educational Books
Published 2019-01-01“…The main purpose of this research is to investigate the weaknesses and strengths of the book entitled "Teaching Methods of Arabic Language" by Ali Aḥmad Madkour based on the quality indicators of educational books. …”
Get full text
Article -
680
The Utility of Circulating Tumor DNA (ctDNA) Monitoring in Cancer Patients Who Are Pregnant or Planning to Become Pregnant
Published 2022-01-01“…Personalized and tumor-informed circulating tumor DNA (ctDNA) testing (Signatera™, bespoke mPCR NGS assay) is a validated, noninvasive blood test that can accurately assess cancer progression and tumor response to treatment ahead of radiological imaging, across solid tumors. …”
Get full text
Article