Suggested Topics within your search.
Suggested Topics within your search.
- Health 23
- methods 19
- Physical fitness 9
- Research 9
- English language 8
- Medicine 7
- prevention & control 7
- Environmental Health 6
- Medical economics 6
- Psychiatric Nursing 6
- Psychology 6
- Public health 6
- health 6
- Health promotion 5
- Methodology 5
- Nursing 5
- Pediatrics 5
- Women 5
- nursing 5
- Anesthesia 4
- Children 4
- Economic policy 4
- Education 4
- Environmental health 4
- Evaluation 4
- Health and hygiene 4
- History 4
- Psychiatric nursing 4
- Psychological aspects 4
- Sociology 4
-
36821
Heterologous Expression of a Potential ‘<i>Paulownia fortunei</i>’ MYB Factor Gene, <i>PfMYB90</i>, Improves Salt and Cold Tolerance in <i>Arabidopsis</i>
Published 2024-12-01“…The research in this area has not received sufficient attention and depth, which also indicates an important potential direction for future research. …”
Get full text
Article -
36822
Effects of Different Intertillage Practices on Soil Biochemical Properties and Soybean Yield in Soybean Fields
Published 2025-01-01“…Intertillage time and depth had a strong influence on the soil microbial characteristics. …”
Get full text
Article -
36823
Impact of COVID-19 on the Air Quality over China and India Using Long-term (2009–2020) Multi-satellite Data
Published 2020-11-01“…Therefore, it is important to further strengthen environmental policies to tackle air quality, human health, and climate change in this part of the world.…”
Get full text
Article -
36824
Evaluate the integrative effects of irrigation water level, furrow irrigation methods, and nitrogen fertilizer rate on tomato yield in semi-arid southern Ethiopia
Published 2025-01-01“…Additionally, the study examines crop agronomy components such as plant height, number of branches, and root depth in semi-arid Southern Ethiopia. The research employs a factorial and split-plot design. …”
Get full text
Article -
36825
Clinical Epidemiological Characteristics and Risk Factors for Severe Bronchiolitis Caused by Respiratory Syncytial Virus in Vietnamese Children
Published 2021-01-01“…The disease is caused by respiratory syncytial virus (RSV) infection, which can cause breathing difficulties and respiratory failure. Therefore, it is necessary to discover the risk factors of severe bronchiolitis to diagnose and treat promptly. …”
Get full text
Article -
36826
Challenges and opportunities in implementing and enforcing India's loose cigarette sales ban: A qualitative stakeholder analysis.
Published 2024-01-01“…Participants included representatives from various government departments such as police, municipal corporations, FDA, health, and civil society organizations / NGOs such as Vital Strategies, World Health Organization, International Union against Tuberculosis and Lung Disease, and local NGOs. …”
Get full text
Article -
36827
Falls and balance impairment; what and how has this been measured in adults with joint hypermobility? A scoping review
Published 2025-01-01“…The underlying mechanisms driving poor balance have not been explored in depth.…”
Get full text
Article -
36828
Colonial legacy and traps in the social-ecological systems of forest management
Published 2024-10-01“…The concept of the rigidity trap pertains to a reforestation strategy that utilized laborers and territories for ecological conservation, restricted local communities from utilizing forests, and diminished biodiversity by favoring the introduction of non-native Acacia decurrens.CONCLUSION: To address traps, this study recommends the need to use a panarchy approach that facilitates a comprehensive understanding of social-ecological systems and to transfer governance to local people which must be based on an in-depth understanding of the local history, knowledge, and cultures.…”
Get full text
Article -
36829
Failure Mechanisms and the Control of a Longwall Face with a Large Mining Height within a Shallow-Buried Coal Seam
Published 2021-01-01“…Experiments using physical models representing different mining heights have been carried out and showed that the horizontal displacement increases from 6 to 12 mm and load-bearing capacity decreases from 20 to 7.9 kN when the coal wall increases in height from 3 to 9 m. Furthermore, failure depth and failure height show an increasing trend. …”
Get full text
Article -
36830
High-intensity focused ultrasound: an innovative approach for micro-manipulation of demineralized dentine
Published 2025-01-01“…Confocal microscopy of Rhodamine-B stained ACSD (n = 5/group) quantified the depth of dentine microscale removal post-HIFU exposure in a time-dependent manner. …”
Get full text
Article -
36831
New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms
Published 2022-01-01“…With the in-depth development of new-generation network technologies such as the Internet, big data, and cloud intelligence, people can obtain massive amounts of information on mobile phones or mobile platforms. …”
Get full text
Article -
36832
The Dynamic Damage Mechanisms and Failure Modes of Coal-Rock Masses under the Action of High Order P-Waves
Published 2018-01-01“…In the process of deep mining, the coal-rock masses were subjected to different types’ disturbance of dynamic loading, and they propagated to the depth of coal and rock in the forms of stress waves. …”
Get full text
Article -
36833
Effects of rosemary extract and its residue on production, immune performance, and gut microbiota in geese
Published 2025-01-01“…Compared with RE treatment, those in the RR treatment had significantly higher duodenal and jejunum relative lengths, aspartate aminotransferase, uric acid, total cholesterol, and low-density lipoprotein levels, and decreased chest depth, chest angle, neck length, semi-eviscerated and eviscerated weights, crude protein digestibility, and levels of globulin, triglyceride, and lysozyme (p < 0.05). …”
Get full text
Article -
36834
Modeling vegetation density with remote sensing, normalized difference vegetation index and biodiversity plants in watershed area
Published 2024-10-01“…Within the Bengkulu watershed area, a total of 49 tree species from 22 families were identified, with diversity indices falling within the moderate category.CONCLUSION: An in-depth knowledge of the ecological factors and plant preservation initiatives in the Bengkulu watershed can greatly aid in sustainable environmental management and help policymakers develop more effective policies for ensuring environmental sustainability. …”
Get full text
Article -
36835
Distribution Pattern of Cadmium in the Profile of Shallow Fissure Soil and Its Influencing Factors in Karst Areas with High Geological Background
Published 2024-12-01“…The average Cd concentration was 2.99 mg/kg, the concentration was high at 0—20 cm and gradually decreased with increasing soil depth, and Cd was predominantly in the reducible form. (3) Total Cd concentration was mainly influenced by soil pH, CEC, clay, silt, and water-stable aggregates, with CEC being the primary controlling factor for the vertical distribution of Cd. (4) The distribution of Cd speciation was controlled by different factors, depending on the form of Cd, with the weak acid-extractable form primarily influenced by organic matter, the reducible form mainly influenced by CEC, the oxidizable form mainly influenced by CEC, clay, and silt, and the residual form mainly influenced by silt content. (5) There was a significant difference in Cd concentration between the soils of funnel-shaped and trapezoidal fissure profiles and the rectangular fissure profile. …”
Get full text
Article -
36836
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
36837
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01“…The work presents an in-depth threat model specific to adversarial malware evasion attacks, describing the unique attack surfaces of malware detectors and outlining adversarial goals tailored to the malware domain. …”
Get full text
Article -
36838
Design and Test of Combined Air Suction Cotton Breed Seeder
Published 2020-01-01“…It can sow two rows at a time, and the line spacing, plant spacing, and sowing depth can be continuously adjusted to achieve precise sowing. …”
Get full text
Article -
36839
Adsorption characteristics of metronidazole on CoZr-LDH and its GO nanocomposite: Experimental and theoretical study
Published 2025-02-01“…This approach, known for simulating numerous particle trajectories and statistical averaging, allowed for an in-depth examination of adsorption mechanisms under various conditions. …”
Get full text
Article -
36840
Preliminary Evaluation of Some Engineering Geological Properties of Soils in the New Yenagoa Town, Bayelsa State, Central Niger Delta
Published 2013-07-01“…The subsurface investigation was undertaken by drilling of ten near the shore drill holes using rotary type drill machine. …”
Get full text
Article