Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
16241
Hodgkin's Disease in Patients with HIV Infection
Published 2011-01-01“…Moreover, in the last years the feasibility of high dose chemotherapy and peripheral stem cell rescue has allowed to save those patients who failed the upfront treatment. Finally, in the near future, a better integration of diagnostic tools (including PET scan), chemotherapy (including new drugs), radiotherapy, HAART, and supportive care will significantly improve the outcome of these patients.…”
Get full text
Article -
16242
Simulation Framework for Cyber-Physical Production System: Applying Concept of LVC Interoperation
Published 2020-01-01“…To be specific, the interface technologies between the heterogeneous simulations and their interoperable methods are developed. Finally, we provide a practical LVC simulation applied in the manufacturing company and show what synergy can be created using the LVC simulation.…”
Get full text
Article -
16243
Existence of Concave Positive Solutions for Boundary Value Problem of Nonlinear Fractional Differential Equation with p-Laplacian Operator
Published 2010-01-01“…By using fixed point theorem, the results for existence and multiplicity of concave positive solutions to the above boundary value problem are obtained. Finally, an example is given to show the effectiveness of our works.…”
Get full text
Article -
16244
The Study of Time Metaphor in Tarikh Beyhaghi; Based on Cognitive Linguistics
Published 2019-02-01“…Researcher searched the existence and quality of time metaphor in the text of Tarikh Beiyhaghi and studied how time, relates to other elements. Finally time is categorized in three groups:" time as an object (movable, stable or other form)", "time as a space or surrounded area", "time as a living creature". …”
Get full text
Article -
16245
An UAV-Assisted Edge Computing Resource Allocation Strategy for 5G Communication in IoT Environment
Published 2022-01-01“…Then, the genetic algorithm is improved by introducing a penalty function to solve this problem, in which selection, crossover, and mutation operations are iterated to obtain the optimal allocation strategy for computational resources. Finally, a simulation platform is constructed to analyze the proposed method. …”
Get full text
Article -
16246
Application of artificial intelligence in mobile communication:challenge and practice
Published 2020-09-01“…The research and application progress in mobile communication,and points out its obstacle for improving the performance of mobile communication system were summarized.A new approach for reducing the gap between the practical and the ideal network performance was put forward creatively,which included the artificial intelligence reconstruction for performance outer loop part,the traditional adaptation or optimization for performance inner loop part,and the optimal cooperation between the two parts.The effectiveness of this approach was proved by the several successful applications.Finally,it pointed out that in order to meet the severe demands of mobile communication system for the “stable” “accurate” and “fast” artificial intelligence solution,and make the mobile network automatic,intelligent and wise,in addition to the excellent performance of the artificial intelligence reconstruction scheme itself,there must also be a feedback closed-loop system architecture based on the big data analysis and analog system,which is the key path to achieve this target.…”
Get full text
Article -
16247
Identification and dipeptidyl peptidase IV (DPP-IV) inhibitory activity verification of peptides from mouse lymphocytes
Published 2022-11-01“…Prediction data showed that they may have dipeptidyl peptidase IV (DPP-IV) inhibitory activity. Finally, two peptides showed better potent inhibition were verified with competitive and noncompetitive modes.…”
Get full text
Article -
16248
Recent advances in research on common targets of neurological and sex hormonal influences on asthma
Published 2025-01-01“…Conclusion We summarize several common important targets in the pathways of action of sex hormones and the nervous system in asthma, provide new directions and ideas for asthma treatment, and discuss current therapeutic limitations and future possibilities. Finally, the article predicts future applications of several important targets in asthma therapy.…”
Get full text
Article -
16249
A power load forecasting method using cosine similarity and a graph convolutional network
Published 2025-01-01“…Second, a collaborative modeling approach is applied to static global factors and dynamic local factors that influence power load trends, enhancing the model’s generalization ability. Finally, extensive experiments on a real-world dataset demonstrate the method’s effectiveness and robustness in forecasting both short-term and long-term load series.…”
Get full text
Article -
16250
The importance of environmental education in preventative healthcare
Published 2014-12-01“…is article is devoted to demonstrating the interrelationships and dependencies of environmental education and preventive healthcare, from definition through to various activities and finally effects. !e article clearly promotes being active, highlighting the importance of being involved in the development of gardens, which are important both in terms of the protection of the natural environment, through the development and diversification of the landscape, and in the maintenance of the good physical and mental condition. …”
Get full text
Article -
16251
Light-dependent modulation of protein localization and function in living bacteria cells
Published 2024-12-01“…We further show that CRY2-CIBN binding kinetics can be modulated by green light, adding a new dimension of control to the system. Finally, we test this optogenetic system in three additional bacterial species, Bacillus subtilis, Caulobacter crescentus, and Streptococcus pneumoniae, providing important considerations for this system’s applicability in bacterial cell biology.…”
Get full text
Article -
16252
Charm and Bottom hadron production with a coalescence plus fragmentation hadronization approach: AA system size scan down to pp collisions
Published 2025-01-01“…The comparison between charm and bottom hadron production offers new insights into both the hadronization mechanisms. Finally, the extension of the model to multi-charmed baryons like Ξcc and Ωccc has shown that multi-charmed baryon yields, especially Ωccc, are sensitive to the thermalization of charm quarks, offering insights into hadronization and quark equilibration dynamics across different systems.…”
Get full text
Article -
16253
UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database
Published 2015-10-01“…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
Get full text
Article -
16254
Cloud native intelligent operation and maintenance technology
Published 2020-12-01“…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
Get full text
Article -
16255
Writing, rewriting and revisiting the Cold War in Tom Stoppard’s Squaring the Circle. Poland 1980-81 (1984)
Published 2022-01-01“…Moreover, Stoppard’s political commitment and his concern about what was happening behind the Iron Curtain tend to show him in a new light. Finally, I examine the way in which history is performed throughout the play and the impact it may have had on the audience at the time.…”
Get full text
Article -
16256
Population Dynamic Study of Prey-Predator Interactions with Weak Allee Effect, Fear Effect, and Delay
Published 2022-01-01“…Stability and Hopf bifurcation are also analyzed. Finally, several numerical simulations are presented to verify the conclusions. …”
Get full text
Article -
16257
Novel Multiband Metal-Rimmed Antenna for Wearable Applications
Published 2015-01-01“…The antenna performances in free-space and on a human phantom simulating a human body are analyzed by means of numerical simulations. Finally, the specific absorption rate (SAR) is analyzed to establish the antenna reliability in wearable applications. …”
Get full text
Article -
16258
Is frozen taxidermy an alternative method for demonstration of dermatopaties?
Get full text
Article -
16259
The Magnetic/Electrical Phase Diagram of Cr-Doped Antiperovskite Compounds GaCFe3−xCrx (0≤x≤0.9)
Published 2013-01-01“…In particular, the Fermi-liquid behavior is obtained below 70 K. Finally, based on the magnetic and electrical properties of GaCFe3−xCrx (0≤x≤0.9) a magnetic/electrical phase diagram was plotted.…”
Get full text
Article -
16260
Design and Construction of Hybrid Music Recommendation System Integrating Music Gene
Published 2022-01-01“…In addition, while adopting the optimal individual retention strategy, this study makes the eigenvalues of the input matrix IX all fall within the unit circle or unit circumference and makes the maximum fitness value of the individuals in the population equal to the global optimal fitness value. Finally, this study constructs an intelligent system. …”
Get full text
Article