Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
30801
Exploring Core Genes Associated with Sepsis and Systemic Inflammatory Response Syndrome Using Single-Cell Sequencing Technology
Published 2025-02-01“…The frequency of occurrence is on the rise, but there is a lack of certain indicators for the timely detection and recognition of illnesses.Methods: By virtue of scRNA-seq, this research has analyzed single-cell transcriptome data from samples taken from groups with septic death and systemic inflammatory response syndrome so as to identify the unique markers and patterns in immune response.Results: By revealing the status of twelve cell clusters of four major cell types in blood samples through UMAP cell clustering and the differences of major cell populations between the dead and SIRS patients, the results have elucidated the components of different cells and their marker genes in two disease states, and the response mechanism beneficial to disease diagnosis in blood samples.Conclusion: By establishing a theoretical framework centered on cellular and molecular regulation, the study has introduced a novel approach for diagnosing and treating sepsis death group and SIRS patients early, as well as differentiating and preventing these conditions.Keywords: sepsis, SIRS, single cell sequencing, biomarkers, single cell transcriptome…”
Get full text
Article -
30802
Experimental Investigation of Geosynthetic-Reinforced Pile-Supported Composite Foundations under Cyclic Loading
Published 2020-01-01“…This paper can provide useful references for developing the theoretical framework and design guides for GRPS composite foundations under cyclic loading.…”
Get full text
Article -
30803
Concept, subject and method of legal psychology
Published 2023-07-01“…The method of legal psychology has been described as a system of special theoretical and practical tools, methods and measures which allow analysing the components of the subject of legal psychology, studying their regularities and formulating reasonable conclusions and scientific concepts on this basis. …”
Get full text
Article -
30804
Wellbeing for young elite musicians: development of a health protocol from a student perspective
Published 2025-02-01“…Recommendations from the health, education, performance science, behavior change, and occupational and public health literature provided theoretical and practical foundations for the project. …”
Get full text
Article -
30805
Frugal Innovations: Implementation in Regions of Poland
Published 2023-01-01“…Implications/limitations: In Poland, there are rather favorable conditions for the implementation of the attributes of the concept of frugal innovations – this is indicated by relatively small differences between the A and B regions. Therefore, in theoretically less developed voivodeships from the so-called Polish B region, frugal innovations are implemented. …”
Get full text
Article -
30806
Effects of a multimedia campaign to increase human papillomavirus vaccine acceptance in Dhaka, Bangladesh
Published 2025-12-01“…We use the Fogg Behavior Model (FBM) as the theoretical framework for our analysis. Using a survey instrument based on the FBM, we analyze cross-sectional data collected from 611 caregivers of girls aged 9–17 in Dhaka. …”
Get full text
Article -
30807
SynC2S: An Efficient Method for Synthesizing Tabular Data With a Learnable Pre-Processing
Published 2025-01-01“…In this study, we propose an efficient and theoretically principled method based on a deep generative model to effectively generate high-quality synthetic tabular data. …”
Get full text
Article -
30808
Sibling similarity can reveal key insights into genetic architecture
Published 2025-01-01“…Inferring the genetic architecture most relevant to this group of individuals is important because they are at the greatest risk of disease and may be more likely to harbour rare variants of large effect due to natural selection. We develop a theoretical framework that derives expected distributions of sibling trait values based on an index sibling’s trait value, estimated trait heritability, and null assumptions that include infinitesimal genetic effects and environmental factors that are either controlled for or have combined Gaussian effects. …”
Get full text
Article -
30809
Investigating the Indices of Social Capital and its Relationship with Sustainable Urban Development
Published 2022-09-01“…In this regard, library studies have been used to explain the literature and theoretical foundations and field method has been used to study the case study. …”
Get full text
Article -
30810
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01“…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
Get full text
Article -
30811
ORGANIZATIONAL COMPONENT OF PUBLIC SERVICE IMPROVEMENT
Published 2024-12-01“…From the standpoint of the targeted approach, the author substantiates the theoretical provisions on the organizational component of the public service improvement, which complement the existing ones by taking into account the current peculiarities (the war in Ukraine and others). …”
Get full text
Article -
30812
Impact of the Constructivist EDGA Model on Learning Some Basic Volleyball Skills for Middle School Female Students
Published 2024-12-01“…Using the stages and steps of the EDGA model, along with the nature of the skills and the sample level, led to the theoretical and practical learning of research skills. …”
Get full text
Article -
30813
Deep Eutectic Solvents (DESs)-Ultrasonic-Assisted Extraction of Paeoniflorin and Paeonol from Moutan Cortex
Published 2022-01-01“…The difference between the experimental value and the theoretical value was 0.333 mg/g. The results showed that the response surface method can simulate and predict the yield of paeoniflorin and paeonol in Moutan Cortex under different extraction conditions, and it was feasible to optimize the process parameters. …”
Get full text
Article -
30814
Pacific Pumas in Indian Jungle: Place of Latin America in Indo-Pacific
Published 2023-11-01“…Carlos Exudé's "Peripheral Realism" provides the theoretical framework for the study, although Latin American states strive to move beyond their peripheral status.The focus is on four Pacific coastal countries in Latin America: Colombia, Mexico, Peru, and Chile. …”
Get full text
Article -
30815
REPRESENTATION OF NATURE AND MAN IN PRACTICAL PHILOSOPHY OF DESCARTES
Published 2017-12-01“…Critical rethinking of the developed Descartes' interpretations in recent scientific papers solves at the same time the tasks of theoretical denial of simplistic world perception and gives grounds for ethics rehabilitation as authentic form of its practical philosophy expression. …”
Get full text
Article -
30816
Public Administration’s Regulatory Acts: Classification Issues
Published 2019-12-01“…The author has emphasized the necessity of forming theoretical system of regulatory acts as forms of public administration, establishing their clear hierarchy and competent independence. …”
Get full text
Article -
30817
DESIGN AND RESEARCH ON MODULAR CUTTERHEAD AND MAIN DRIVE OF VARIABLE MEASUREMENT RECTANGLE PIPE JACKING MACHINE
Published 2022-01-01“…The main fatigue damage points of the crankshaft are concentrated at the fillet of the front main journal, the minimum number of cycles is 3.37×10~7, and the theoretical life is 165 928 h. It can meet the tunneling needs of the pipe jacking machine.…”
Get full text
Article -
30818
Federated Learning Based on Kernel Local Differential Privacy and Low Gradient Sampling
Published 2025-01-01“…To solve this problem, we introduce the random Fourier feature mapping (RFFM) together with kernel local differential privacy (KLDP) and develop a new privacy protection mechanism, called the RFFM-KLDP mechanism, for high-dimensional context data. Theoretical properties show that the proposed privacy-preserving mechanism has the properties of <inline-formula> <tex-math notation="LaTeX">$\epsilon $ </tex-math></inline-formula>-LDP and <inline-formula> <tex-math notation="LaTeX">$\epsilon $ </tex-math></inline-formula>-distance-LDP in the federated learning framework. …”
Get full text
Article -
30819
Data-Driven Methodology for the Prediction of Fluid Flow in Ultrasonic Production Logging Data Processing
Published 2022-01-01“…Compared to previously used methods of feature extraction from the ultrasonic Doppler power spectrum signals, the present method provides a theoretical basis for the interpretation of ultrasonic multiphase flow logging data. …”
Get full text
Article -
30820
Optimization-Based Design of Multi-Band Branch-Line Coupler With Arbitrary and Band-Distinct Power Division Ratios and Phase Differences
Published 2025-01-01“…The achieved measurement results and the agreement between measured results and theoretical expectations demonstrate the applicability of the proposed design procedure in practice. …”
Get full text
Article