Showing 2,901 - 2,920 results of 39,205 for search 'Onchan~', query time: 4.76s Refine Results
  1. 2901

    The influence of adding B. subtilis bacteria on the mechanical and chemical properties of cement mortar by Osama Ahmed Ibrahim, Ahmed Ibrahim Hassanin Mohamed, Wael Ibrahim, Raghda Osama Abd-Al Ftah, Shimaa R. Hamed, Sherif Fakhry M. Abd-Elnaby

    Published 2025-01-01
    “…Bacteria were then added to the cement mortar in amounts of 5% and 10% by weight to evaluate their effect on the mechanical and chemical properties of the modified mortar. …”
    Get full text
    Article
  2. 2902
  3. 2903
  4. 2904
  5. 2905

    The Immunosuppressant Fingolimod (FTY720) for the Treatment of Mechanical Force-Induced Abnormal Scars by Masayo Aoki, Akatsuki Kondo, Noriko Matsunaga, Azusa Honda, Yuri Okubo, Kazuaki Takabe, Rei Ogawa

    Published 2020-01-01
    “…We examined the effects of topical FTY720 injections on mechanical force-induced HS progression. Methods. Mechanical force-induced HSs were generated in C57BL6/J mice by suturing a dorsal incision and applying a stretching device on Days 6, 8, 10, and 12. …”
    Get full text
    Article
  6. 2906

    Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism by Meng Wang, Zhide Chen, Li Xu, Huan Zhan

    Published 2014-01-01
    “…Finally, we use simulation to verify the model. This control mechanism for benign worm propagation is of guiding significance to control the network security.…”
    Get full text
    Article
  7. 2907

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    “…To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.…”
    Get full text
    Article
  8. 2908

    Study of the Influence of Clay Minerals on the Mechanical and Percolation Properties of Weakly Cemented Rocks by Shiru Guo, Hai Pu, Mengsen Yang, Ding Liu, Ziheng Sha, Junce Xu

    Published 2022-01-01
    “…This paper uses the self-designed weakly cemented remodeling mechanism to prepare weakly cemented rock samples with clay minerals accounting for 20%, 30%, 40%, 50%, and 60% of the total. …”
    Get full text
    Article
  9. 2909

    Network pharmacology and experimental verification to investigate the mechanism of isoliquiritigenin for the treatment of Alzheimer’s disease by Waimao Gao, Guang Yang, Xinjuan Liu, Kaifan Hu, Jie Pan, Xingyu Wang, Yan Zhao, Ying Xu

    Published 2025-02-01
    “…The present study aimed to investigate the molecular mechanisms of ISL against AD. In this study, AD targets and ISL targets were collected via different databases. …”
    Get full text
    Article
  10. 2910
  11. 2911
  12. 2912

    Deciphering the anti-obesity mechanisms of pharmabiotic probiotics through advanced multiomics analysis by Ye-Rim Kim, Tae-Rim Choi, Sung-Hyun Jo, Won-Suk Song, TaeHyun Kim, Min-Gyu Kim, Ji-Hyun Baek, Seo-Young Kwon, Bo-Gyeong Choi, Sang Woo Seo, Chol-Soon Jang, Yung-Hun Yang, Yun-Gon Kim

    Published 2025-02-01
    “…However, the molecular mechanisms underlying their anti-obesity effects remain largely unexplored due to the absence of a universal methodology. …”
    Get full text
    Article
  13. 2913
  14. 2914
  15. 2915
  16. 2916

    EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs by Daniel Granlund, Christer Åhlund, Patrik Holmlund

    Published 2015-04-01
    “…By utilizing lightweight hashing algorithms, the challenge-response authentication mechanism uses only two round trips to the AAA server for the complete authentication procedure leading to the reduction of latency by 33% compared to the baseline protocols. …”
    Get full text
    Article
  17. 2917

    Automatic Scaling Mechanism of Intermodal EDI System under Green Cloud Computing by Qiang Huang, Lin Sun, Furong Jia, Jiaxin Yuan, Yao Wu, Jinshan Pan

    Published 2022-01-01
    “…In order to solve the problem of mismatching between application load and computing resource capacity and realize on-demand resource allocation and low carbon emission, this paper proposes to build an Extensible EDI system (XEDI) based on MSA and studies the scaling mechanism in container environment. Based on the resource scheduling characteristics of container cloud and considering the distribution and heterogeneity of intermodal cloud computing platform from the perspective of resource allocation, the automatic scaling mechanism of XEDI is established, the scaling model is established, and the automatic scaling algorithm is proposed. …”
    Get full text
    Article
  18. 2918
  19. 2919

    Instruction and demonstration-based secure service attribute generation mechanism for textual data by LI Chenhao, WANG Na, LIU Aodi

    Published 2024-12-01
    “…Thus, a secure service attribute generation mechanism for textual data (IDSAM) was introduced. …”
    Get full text
    Article
  20. 2920

    Uncovering the Mechanism of Action of Antiprotozoal Agents: A Survey on Photoaffinity Labeling Strategy by Alessandro Giraudo, Cristiano Bolchi, Marco Pallavicini, Roberto Di Santo, Roberta Costi, Francesco Saccoliti

    Published 2024-12-01
    “…More recently, PAL has been exploited to unravel the molecular basis of bioactive compounds’ function in live parasites, allowing elucidation of the mechanism of action of both approved drugs and new chemical entities. …”
    Get full text
    Article