Showing 16,241 - 16,260 results of 29,723 for search 'Winaq~', query time: 2.92s Refine Results
  1. 16241

    Hodgkin's Disease in Patients with HIV Infection by Michele Spina, Antonino Carbone, Annunziata Gloghini, Diego Serraino, Massimiliano Berretta, Umberto Tirelli

    Published 2011-01-01
    “…Moreover, in the last years the feasibility of high dose chemotherapy and peripheral stem cell rescue has allowed to save those patients who failed the upfront treatment. Finally, in the near future, a better integration of diagnostic tools (including PET scan), chemotherapy (including new drugs), radiotherapy, HAART, and supportive care will significantly improve the outcome of these patients.…”
    Get full text
    Article
  2. 16242

    Simulation Framework for Cyber-Physical Production System: Applying Concept of LVC Interoperation by Byeong Soo Kim, Seunghoon Nam, Yooeui Jin, Kyung-Min Seo

    Published 2020-01-01
    “…To be specific, the interface technologies between the heterogeneous simulations and their interoperable methods are developed. Finally, we provide a practical LVC simulation applied in the manufacturing company and show what synergy can be created using the LVC simulation.…”
    Get full text
    Article
  3. 16243

    Existence of Concave Positive Solutions for Boundary Value Problem of Nonlinear Fractional Differential Equation with p-Laplacian Operator by Jinhua Wang, Hongjun Xiang, ZhiGang Liu

    Published 2010-01-01
    “…By using fixed point theorem, the results for existence and multiplicity of concave positive solutions to the above boundary value problem are obtained. Finally, an example is given to show the effectiveness of our works.…”
    Get full text
    Article
  4. 16244

    The Study of Time Metaphor in Tarikh Beyhaghi; Based on Cognitive Linguistics by Ydollah Shokri, Samaneh Shamsizadeh

    Published 2019-02-01
    “…Researcher searched the existence and quality of time metaphor in the text of Tarikh Beiyhaghi and studied how time, relates to other elements. Finally time is categorized in three groups:" time as an object (movable, stable or other form)", "time as a space or surrounded area", "time as a living creature". …”
    Get full text
    Article
  5. 16245

    An UAV-Assisted Edge Computing Resource Allocation Strategy for 5G Communication in IoT Environment by Hao Liu

    Published 2022-01-01
    “…Then, the genetic algorithm is improved by introducing a penalty function to solve this problem, in which selection, crossover, and mutation operations are iterated to obtain the optimal allocation strategy for computational resources. Finally, a simulation platform is constructed to analyze the proposed method. …”
    Get full text
    Article
  6. 16246

    Application of artificial intelligence in mobile communication:challenge and practice by Yusun FU, Genke YANG

    Published 2020-09-01
    “…The research and application progress in mobile communication,and points out its obstacle for improving the performance of mobile communication system were summarized.A new approach for reducing the gap between the practical and the ideal network performance was put forward creatively,which included the artificial intelligence reconstruction for performance outer loop part,the traditional adaptation or optimization for performance inner loop part,and the optimal cooperation between the two parts.The effectiveness of this approach was proved by the several successful applications.Finally,it pointed out that in order to meet the severe demands of mobile communication system for the “stable” “accurate” and “fast” artificial intelligence solution,and make the mobile network automatic,intelligent and wise,in addition to the excellent performance of the artificial intelligence reconstruction scheme itself,there must also be a feedback closed-loop system architecture based on the big data analysis and analog system,which is the key path to achieve this target.…”
    Get full text
    Article
  7. 16247

    Identification and dipeptidyl peptidase IV (DPP-IV) inhibitory activity verification of peptides from mouse lymphocytes by Juan Wang, Yujia Xie, Yuanyuan Luan, Tingting Guo, Shanshan Xiao, Xingxing Zeng, Shaohui Zhang

    Published 2022-11-01
    “…Prediction data showed that they may have dipeptidyl peptidase IV (DPP-IV) inhibitory activity. Finally, two peptides showed better potent inhibition were verified with competitive and noncompetitive modes.…”
    Get full text
    Article
  8. 16248

    Recent advances in research on common targets of neurological and sex hormonal influences on asthma by Wenting Zhou, Huan Chen, Xinyu Chen, Jing Gao, Wenting Ji

    Published 2025-01-01
    “…Conclusion We summarize several common important targets in the pathways of action of sex hormones and the nervous system in asthma, provide new directions and ideas for asthma treatment, and discuss current therapeutic limitations and future possibilities. Finally, the article predicts future applications of several important targets in asthma therapy.…”
    Get full text
    Article
  9. 16249

    A power load forecasting method using cosine similarity and a graph convolutional network by JI Shan, JIANG Wei, JING Xin

    Published 2025-01-01
    “…Second, a collaborative modeling approach is applied to static global factors and dynamic local factors that influence power load trends, enhancing the model’s generalization ability. Finally, extensive experiments on a real-world dataset demonstrate the method’s effectiveness and robustness in forecasting both short-term and long-term load series.…”
    Get full text
    Article
  10. 16250

    The importance of environmental education in preventative healthcare by Ryszard Kowalski, Edward Grott

    Published 2014-12-01
    “…is article is devoted to demonstrating the interrelationships and dependencies of environmental education and preventive healthcare, from definition through to various activities and finally effects. !e article clearly promotes being active, highlighting the importance of being involved in the development of gardens, which are important both in terms of the protection of the natural environment, through the development and diversification of the landscape, and in the maintenance of the good physical and mental condition. …”
    Get full text
    Article
  11. 16251

    Light-dependent modulation of protein localization and function in living bacteria cells by Ryan McQuillen, Amilcar J. Perez, Xinxing Yang, Christopher H. Bohrer, Erika L. Smith, Sylvia Chareyre, Ho-Ching Tiffany Tsui, Kevin E. Bruce, Yin Mon Hla, Joshua W. McCausland, Malcolm E. Winkler, Erin D. Goley, Kumaran S. Ramamurthi, Jie Xiao

    Published 2024-12-01
    “…We further show that CRY2-CIBN binding kinetics can be modulated by green light, adding a new dimension of control to the system. Finally, we test this optogenetic system in three additional bacterial species, Bacillus subtilis, Caulobacter crescentus, and Streptococcus pneumoniae, providing important considerations for this system’s applicability in bacterial cell biology.…”
    Get full text
    Article
  12. 16252

    Charm and Bottom hadron production with a coalescence plus fragmentation hadronization approach: AA system size scan down to pp collisions by Plumari Salvatore, Minissale Vincenzo, Greco Vincenzo

    Published 2025-01-01
    “…The comparison between charm and bottom hadron production offers new insights into both the hadronization mechanisms. Finally, the extension of the model to multi-charmed baryons like Ξcc and Ωccc has shown that multi-charmed baryon yields, especially Ωccc, are sensitive to the thermalization of charm quarks, offering insights into hadronization and quark equilibration dynamics across different systems.…”
    Get full text
    Article
  13. 16253

    UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database by Tao WEN, Yu-qing ZHANG, Qi-xu LIU, Gang YANG

    Published 2015-10-01
    “…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
    Get full text
    Article
  14. 16254

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  15. 16255

    Writing, rewriting and revisiting the Cold War in Tom Stoppard’s Squaring the Circle. Poland 1980-81 (1984) by Jean Du Verger

    Published 2022-01-01
    “…Moreover, Stoppard’s political commitment and his concern about what was happening behind the Iron Curtain tend to show him in a new light. Finally, I examine the way in which history is performed throughout the play and the impact it may have had on the audience at the time.…”
    Get full text
    Article
  16. 16256

    Population Dynamic Study of Prey-Predator Interactions with Weak Allee Effect, Fear Effect, and Delay by Ye Xuan Li, Hua Liu, Yu Mei Wei, Ming Ma, Gang Ma, Jing Yan Ma

    Published 2022-01-01
    “…Stability and Hopf bifurcation are also analyzed. Finally, several numerical simulations are presented to verify the conclusions. …”
    Get full text
    Article
  17. 16257

    Novel Multiband Metal-Rimmed Antenna for Wearable Applications by Bin Liu, Jianghong Han, Songhua Hu, Li Zhang

    Published 2015-01-01
    “…The antenna performances in free-space and on a human phantom simulating a human body are analyzed by means of numerical simulations. Finally, the specific absorption rate (SAR) is analyzed to establish the antenna reliability in wearable applications. …”
    Get full text
    Article
  18. 16258

    Is frozen taxidermy an alternative method for demonstration of dermatopaties? by Beste Demirci, Murat Erdem Gültiken, Mehmet Önder Karayiğit, Kerem Atalar

    “…After the taxidermy was thawed at room temperature, it was investigated for histo-pathologically and microbiologically. Finally, the disappeared hyperaemic areas were stained to imitate post-mortem appearance. …”
    Get full text
    Article
  19. 16259

    The Magnetic/Electrical Phase Diagram of Cr-Doped Antiperovskite Compounds GaCFe3−xCrx (0≤x≤0.9) by S. Lin, B. S. Wang, P. Tong, D. F. Shao, Y. N. Huang, W. J. Lu, B. C. Zhao, W. H. Song, Y. P. Sun

    Published 2013-01-01
    “…In particular, the Fermi-liquid behavior is obtained below 70 K. Finally, based on the magnetic and electrical properties of GaCFe3−xCrx (0≤x≤0.9) a magnetic/electrical phase diagram was plotted.…”
    Get full text
    Article
  20. 16260

    Design and Construction of Hybrid Music Recommendation System Integrating Music Gene by Xuelin Zhao

    Published 2022-01-01
    “…In addition, while adopting the optimal individual retention strategy, this study makes the eigenvalues of the input matrix IX all fall within the unit circle or unit circumference and makes the maximum fitness value of the individuals in the population equal to the global optimal fitness value. Finally, this study constructs an intelligent system. …”
    Get full text
    Article