-
461
Efficient analysis of drug interactions in liver injury: a retrospective study leveraging natural language processing and machine learning
Published 2024-12-01“…Electronic medical records contain comprehensive clinical information and have gained increasing attention as a potential resource for DDI detection. However, a substantial portion of adverse drug reaction (ADR) information is hidden in unstructured narrative text, which has yet to be efficiently harnessed, thereby introducing bias into the research. …”
Get full text
Article -
462
Lactylation: From Homeostasis to Pathological Implications and Therapeutic Strategies
Published 2025-06-01“…Moreover, we discuss advanced detection technologies and potential therapeutic interventions targeting lactylation pathways. …”
Get full text
Article -
463
Unsustainable anthropogenic mortality threatens the long-term viability of lion populations in Mozambique.
Published 2025-01-01“…Our findings suggest that resilience to anthropogenic threats is largely a function of lion population size as well as resource and management capacity. …”
Get full text
Article -
464
A UAV Image Stitching Method for Complex Urban Environments
Published 2025-07-01Get full text
Article -
465
An Observational Study on Pre-natal Diagnosis of Congenital Talipes Equinovarus
Published 2025-07-01“…Future research should assess long-term functional outcomes and optimize pre-natal screening protocols, particularly in resource-limited settings, to ensure comprehensive CTEV management.…”
Get full text
Article -
466
Early Fault-Tolerant Quantum Algorithms in Practice: Application to Ground-State Energy Estimation
Published 2025-04-01“…Additionally, we provide quantitative resource estimates, demonstrating a constant factor improvement in the number of samples required to detect a specified change in CDF. …”
Get full text
Article -
467
Distribution, behavior and diet of the Asiatic black bear in human modified landscapes
Published 2024-11-01“…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
Get full text
Article -
468
Advances in key technologies for the management, restoration, development, and utilization of coal mining subsidence areas
Published 2025-07-01“…BackgroundCoal mining subsidence areas, formed by the exploitation of coal resources, have emerged as severe challenges to the construction of ecological civilization and the sustainable development of the social economy in China. …”
Get full text
Article -
469
Leveraging Blockchain Technology With Enhanced MDSVA for Robust Meteorological Sensor Data Validation
Published 2025-01-01“…Our enhanced MDSVA introduces a sophisticated five-component validation function that simultaneously addresses drift and noise compensation, environmental adaptation, periodic variations, dynamic thresholds, and transient adjustments. …”
Get full text
Article -
470
LeafDPN: An Improved DPN Model for the Identification of Bacterial Blight in Soybean in Natural Environments
Published 2024-12-01“…<i>glycinea</i>, is one of the most devastating diseases in soybean with significant yield losses ranging from 4% to 40%. The timely detection of BBS is the foundation for disease control. …”
Get full text
Article -
471
Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol
Published 2025-07-01“…The RL-based mechanism continuously adapts decision-making by learning from system states, prioritizing transactions, and dynamically resolving conflicts using a reward function that accounts for key performance parameters, including the number of conflicting transactions, cost of aborting transactions, temporal validity constraints, and system resource utilization. …”
Get full text
Article -
472
Assessing chronic obstructive pulmonary disease risk based on exhalation and cough sounds
Published 2025-07-01“…Following this, each individual completed pulmonary function tests and participated in questionnaire surveys. …”
Get full text
Article -
473
Mitochondrial genome of Lonicera macranthoides: features, RNA editing, and insights into male sterility
Published 2025-01-01Get full text
Article -
474
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
475
Effect of PM2.5 exposure on susceptibility to allergic asthma in elderly rats treated with allergens
Published 2025-02-01Get full text
Article -
476
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
477
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
478
Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade
Published 2025-06-01“…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
Get full text
Article -
479
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
480
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article