Suggested Topics within your search.
Suggested Topics within your search.
- History 25
- Politics and government 11
- History and criticism 10
- Law reports, digests, etc 9
- Social conditions 9
- Civilization 6
- Economic conditions 6
- Law 6
- Philosophy 6
- Economic policy 5
- Mass media 5
- Moral and ethical aspects 5
- Photography 5
- Psychology 5
- Women 5
- methods 5
- English language 4
- Methodology 4
- Constitutional law 3
- Criminal law 3
- Digital techniques 3
- Education, Elementary 3
- Educational technology 3
- Information technology 3
- Interpretation and construction 3
- Language 3
- Leadership 3
- Personnel management 3
- Research 3
- Social aspects 3
-
6401
100 Tbit/s Optical Transmission Technology on Single Mode Fiber
Published 2015-10-01Get full text
Article -
6402
Biochemical characteristics, genetic variants and treatment outcomes of 55 Chinese cases with neonatal intrahepatic cholestasis caused by citrin deficiency
Published 2025-01-01“…All NICCD patients were followed up until death or at least 1 year of age.ResultsCompared to INC group, significant increase was found in levels of total bilirubin, indirect bilirubin, total bile acid, gamma-glutamyl transpeptidase, alkaline phosphatase, prothrombin time, thrombin time, international normalized ratio, alpha-fetoprotein (AFP), Vitamin D, and Vitamin E of NICCD group, while alanine aminotransferase, albumin, fibrinogen, glucose, and Vitamin A levels showed significant decrease in the NICCD group (P < 0.05). …”
Get full text
Article -
6403
Application-aware IPv6 networking
Published 2020-08-01“…Internet applications have different needs for network bandwidth,latency,jitter,and packet loss.However,the fact that the network and applications are decoupled makes it difficult for the network to be aware of an application’s requirements and ensure its quality of service (e.g.,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
Get full text
Article -
6404
Effect of Aeroelastic Tailoring Design on Wing Mode
Published 2023-01-01“…The modal frequencies obtained by the mixed angle layering scheme are obviously larger than those obtained by the layering scheme composed of only two angles. …”
Get full text
Article -
6405
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01“…The security flaws of the group signature proposed by Zhang Jianhong and etc.was analyzed.It pointed out that the group signature was not untraceable for the revocation center could not open a valid group signature.A coalition attack that the manager and the revocation center could conspire to generate valid group signatures and impose them on an arbitrary member of the group was presented.The security analysis show that the scheme is insecure.…”
Get full text
Article -
6406
Prediction of Fracture Evolution and Groundwater Inrush from Karst Collapse Pillars in Coal Seam Floors: A Micromechanics-Based Stress-Seepage-Damage Coupled Modeling Approach
Published 2020-01-01“…An in situ high-precision microseismic monitoring technology is used to verify the micromechanical modeling results, which indicate that the numerical model successfully reproduces the damage and fracture evolution in a coal seam floor with a KCP during the mining process. …”
Get full text
Article -
6407
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01“…A safety test using open source tools was put forward to construct four layer network scan architecture pattern for monitoring server safety,it also can get an automatic analysis report of threaten for the administrators.Through the timing detection mechanism based on process from hardware to software,from the operating system to the service application even to the dynamic page script to build a full range,customizable,flexible combination of multi-level security…”
Get full text
Article -
6408
Systematic Administration of B Vitamins Alleviates Diabetic Pain and Inhibits Associated Expression of P2X3 and TRPV1 in Dorsal Root Ganglion Neurons and Proinflammatory Cytokines...
Published 2020-01-01“…Western blot analysis and immunohistochemistry were used to analyze protein expressions in DRG and ELISA to measure the proinflammatory cytokines in the spinal cord. …”
Get full text
Article -
6409
Evaluating choroidal vascular changes in young adults with high myopia utilizing swept source optical coherence tomography angiography
Published 2025-02-01“…Results: SCP and DCP densities in the foveal retina of NHM group were significantly lower than those in HM group(SCP 20.09 ± 4.30 vs. 21.54 ± 4.52, p = 0.043;DCP14.73 ± 3.93 vs. 16.21 ± 4.07, p = 0.024). …”
Get full text
Article -
6410
Joint Flood Control Operation of Reservoirs in Xiaoshui Basin Based on DP-PS Algorithm
Published 2024-10-01“…Taking the reservoir group in the Xiaoshui Basin as the research object, this paper builds a model of joint flood control operation of the reservoir group in the Xiaoshui Basin under combined floods from main and tributary rivers of different frequencies. …”
Get full text
Article -
6411
Composite Tor traffic features extraction method of webpage in actual network flow based on SDN
Published 2022-03-01“…Website fingerprinting (WF) methods for Tor webpage traffic are often based on the separated Tor traffic or even the separated Tor webpage traffic.However, distinguishing Tor traffic from the original traffic of the actual network and Tor webpage traffic from the Tor traffic costs amount of computation, which is more difficult than the WF attack itself.According to the current architecture of the Internet and the characteristics of network traffic converging to regional central nodes, the bi-directional statistical feature (BSF) was proposed for distinguishing Tor traffic through the intra-domain global perspective provided by the SDN structure of the central node and the node information disclosed by the Tor network.Furthermore, a hidden feature extraction method for Web traffic based on lifted structure fingerprinting (LSF) was proposed, and a composited Tor-webpage-identification traffic feature (CTTF) was proposed based on BSF and LSF deep features.For solving the problem of traffic training data scarcity, a traffic data augmentation method based on translation was proposed, which made the augmented traffic data as consistent as the Tor traffic data captured in the real working environment.The experimental results show that the identification rate based on CTTF can be improved by about 4% compared with using only the original data features.When there is less training data, the classification accuracy is improved more obvious after using the traffic data augmentation method, and the false positive rate can be effectively reduced.…”
Get full text
Article -
6412
TNF-α and Microalbuminuria in Patients with Type 2 Diabetes Mellitus
Published 2014-01-01“…Conclusions. In patients with type 2 DM, urinary, but not serum, TNF-α levels are associated with the presence and severity of microalbuminuria.…”
Get full text
Article -
6413
Hypertensive disorders of pregnancy affected thyroid hormone synthesis via endoplasmic reticulum stress in preterm infant rats
Published 2025-01-01“…Furthermore, the protein levels of Tg, NIS and TSHR were reduced, while the protein level of p-IRE1α, ATF6α, XBP1s and Bip were increased in the L-NAME group. …”
Get full text
Article -
6414
A Three-Vector Fast Model Predictive Control Method for Steady State Performance Improvement
Published 2025-01-01“…A fast three-vector model predictive control method based on an improved H8 inverter is proposed for the Permanent Magnet Synchronous Motor (PMSM) driven by a two-level three-phase voltage source inverter. …”
Get full text
Article -
6415
Modeling the Mechanical Properties of Functionalized Carbon Nanotubes and Their Composites: Design at the Atomic Level
Published 2014-01-01“…The configuration does, however, affect the tensile strength and critical buckling stress of CNTs. …”
Get full text
Article -
6416
-
6417
Analgesic Effect of Ultrasound-Guided Anterior Quadratus Lumborum Block at the L2 Level in Patients Undergoing Laparoscopic Partial Nephrectomy: A Single-Center, Randomized Control...
Published 2022-01-01“…Sufentanil consumption during the perioperative period (155.41 [19.58] vs 119.37 [12.41] μg, p < 0.001) and sufentanil dosage during surgery and 0–6 h, 6–12 h, and 12–24 h after surgery were lower in group Q than in group C, while 24–48 h after surgery was similar between both groups. …”
Get full text
Article -
6418
Exploring the Hepatoprotective Effect of Agaricus bisporus Based on Network Pharmacology
Published 2025-01-01“…To investigate the hepatoprotective components and mechanism of Agaricus bisporus ethanol extract (ABEE), ultra-high performance liquid chromatography-tandem mass spectrometry (UPLC-MS/MS) was used to analyze and identify the components of ABEE. …”
Get full text
Article -
6419
Statistical Analysis of the Sensitivity of CRS-R Scale Projects in Consciousness Evaluation
Published 2017-10-01“…The data were introduced into SPSS 17.0 statistical software, and the correlation between each project and the state of consciousness was analyzed by using the correlation analysis function and decision tree function. …”
Get full text
Article -
6420
Prognostic analysis of helical tomotherapy stereotactic body radiotherapy in multiple primary or second primary lung cancers
Published 2025-01-01“…Methods From January 2010 to September 2023, 106 MPLCs and SPLC (T1-3N0M0) underwent HT-SBRT. The cumulative incidence for local recurrence (LR) was calculated using the competing risk approach and compared using Gray’s test. …”
Get full text
Article