Showing 17,501 - 17,520 results of 29,723 for search 'Winaq~', query time: 2.38s Refine Results
  1. 17501

    Identification and validation of BATF as a prognostic biomarker and regulator of immune cell infiltration in acute myeloid leukemia by Zhe Zhao, Dongmei Wang, Dongmei Wang, Xue Sheng, Shuying Li, Tingting Liu, Mengyuan Chang, Lei Feng, Di Zhang, Chunyan Ji, Chunyan Ji, Fei Lu, Jingjing Ye

    Published 2025-01-01
    “…Meanwhile, we detected the connection between BATF expression and the proportions of immune cells via flow cytometry in C1498 mouse model of AML. Finally, we investigated the association between BATF expression and cell-cell communication within the AML cell population using single-cell sequencing.ResultsIn this study, we thoroughly investigated the role of BATF in AML. …”
    Get full text
    Article
  2. 17502

    Types de dominance agressive dans une colonie constituée exclusivement de males chimpanzés : intensité, fréquence, durée et direction de l'agression by Nerea Amezcua Valmala, Javier de Echegaray y Díaz de Otazu, Belén Fernández Castilla, Catarina Casanova, Fernando Colmenares

    Published 2015-03-01
    “…Next, we correlated the two rank orders thus obtained. Finally, we studied whether aggressive dominance rank orders were consistent across the various aggression-based measures. …”
    Get full text
    Article
  3. 17503

    Sistem Pakar : Deteksi Dini Stres pada Masa Pandemi Covid-19 Menggunakan Metode Forward Chaining by Angga Wijaya Narwa Putra, Nadea Cipta Laksmita

    Published 2022-02-01
    “… Berawal pada penyebaran virus Covid-19 dari Negara Cina ke berbagai negara hingga akhirnya masuk ke Indonesia pada bulan Maret 2020 menyebabkan ketidakstabilan kehidupan sosial dan ekonomi. …”
    Get full text
    Article
  4. 17504
  5. 17505

    Integrative single-cell and bulk RNA-seq analyses identify CD4+ T-cell subpopulation infiltration and biomarkers of regulatory T cells involved in mediating the progression of athe... by Yifeng Zhang, Yifeng Zhang, Shuxian Lu, Shuxian Lu, Liang Qiu, Liang Qiu, Manman Qin, Manman Qin, Dan Shan, Lianhua Xie, Yao Yi, Yao Yi, Jun Yu

    Published 2025-01-01
    “…The key genes diagnostic potential was assessed via receiver operating characteristic (ROC) curve analysis. Finally, the target genes were validated in AS model using Ldlr−/− mice.ResultsWe found that the proportion of Tregs significantly decreased, and Th2 cells showed a significant increase in atherosclerotic plaque compared to that in non-plaque arterial tissues. …”
    Get full text
    Article
  6. 17506

    Se rapprocher du « réel » ou diversifier les compétences ? Un atelier coopératif de conception architecturale à l’ENSA de Clermont-Ferrand by Rémi Laporte

    Published 2024-12-01
    “…It also seeks to characterize the nature of this cooperation and the relationships between actors that it creates, bringing them closer to the concept of social transaction. Finally, it identifies limitations and biases, both in the teaching process and in its results.…”
    Get full text
    Article
  7. 17507

    Discussion on Artificial Intelligence Safety and Ethical Issues by Chen Xinyu, Hui Tianfang, Li Yanlin, Yang Haoyuan

    Published 2025-01-01
    “…It also highlights the importance of increasing the transparency and explainability of AI to enhance public trust. Finally, the paper emphasizes the importance of defining accountability for AI behavior and suggests establishing laws and regulations that effectively govern AI applications. …”
    Get full text
    Article
  8. 17508

    Compounds of Marine Origin with Possible Applications as Healing Agents by Nektaria-Ioanna Karma, Fotini Mellou, Panagoula Pavlou, Angeliki Siamidi, Athanasia Varvaresou

    Published 2024-12-01
    “…Numerous studies have been referenced, showcasing their efficacy in wound healing. Finally, important data in regard to their stability, limitations, and challenges to their use, safety issues, and the existing legislative framework are extensively reviewed.…”
    Get full text
    Article
  9. 17509

    Supply Capability Evaluation of Intelligent Manufacturing Enterprises Based on Improved BP Neural Network by Quan Quan, Zhongqiang Zhang

    Published 2022-01-01
    “…Through the collected sample data, the network is trained and simulated, and the results are analyzed. Finally, the designed model is applied to a large battery manufacturing enterprise, and the supplier efficiency evaluation method based on DPMPSO-BP neural network is validated and analyzed. …”
    Get full text
    Article
  10. 17510

    Inflammation and Immune Response in COPD: Where Do We Stand? by Nikoletta Rovina, Antonia Koutsoukou, Nikolaos G. Koulouris

    Published 2013-01-01
    “…Furthermore, viral and bacterial infections interfere with the chronic inflammation seen in stable COPD and exacerbations via pathogen-associated molecular patterns (PAMPs). Finally, autoimmunity is another novel aspect that may play a critical role in the pathogenesis of COPD. …”
    Get full text
    Article
  11. 17511

    Cooperative Optimization QoS Cloud Routing Protocol Based on Bacterial Opportunistic Foraging and Chemotaxis Perception for Mobile Internet by Shujuan Wang, Long He, Guiru Cheng

    Published 2015-01-01
    “…This mechanism is based on the characteristics of drug resistance of bacteria and the structure of the field, and through many iterations of the individual behavior and population behavior the bacteria can be spread to the food gathering area with a certain probability. Finally, QoS cloud routing path would be selected and optimized based on bacterial bionic optimization and hedge mapping relationship between mobile Internet node and bacterial population evolution iterations. …”
    Get full text
    Article
  12. 17512

    ANALYSIS SCHEME FOR MULTI-FAULTS VIBRATION OF GEARBOX BASED ON DISCRETE RANDOM SEPARATION by HE DongTai, GUO Yu, WU Xing, LIU ZhiQi, ZHAO Lei

    Published 2019-01-01
    “…As a result, the gear fault corresponding envelope component and the bearing fault related envelope component are obtained; Finally, the spectrum analysis is carry out on the two envelope components respectively for the fault diagnosis information. …”
    Get full text
    Article
  13. 17513

    Communication Network for Sports Activity Monitoring Systems by Yuhua Li, Lishuang Wan, Haimin Zhang

    Published 2021-01-01
    “…We match the identity through the chip and collect the physical fitness data generated in the process of exercise and centralized test by the sensor in real-time. Finally, the data transmission is realized through the WIFI communication function to achieve the purpose of monitoring physical exercise and improving physical quality. …”
    Get full text
    Article
  14. 17514

    Robust optimization of air based relay for internet of things based on UAV by Wei WANG, Renqian GU, Li3 PENG, Jijun ZHAO, Zhongcheng WEI, Cunxi CHANG

    Published 2022-03-01
    “…Faced with the need of key regional information transmission in the emergency situation where the perception network lacks of ground base stations, considered about the uncertainty of spatial positioning of emergency internet of things (eIoT) nodes, a robust optimization method for air-based relay of eIoT based on unmanned aerial vehicle (UAV) was proposed.Firstly, the system modeling of this kind of eIoT was carried out.Secondly, according to the fact that the non-convex and nonlinear model has a great correlation with the positioning accuracy of the ground-based eIoT equipment and the tiny disturbance of the positioning information can lead to the invalid solution of the model, the system model was relaxed and the uncertainty description of the location data of the eIoT equipment was introduced, Then the robust equivalent model of the low altitude UAV relay communication power optimization problem was obtained.Thirdly, the model solving algorithm was given.Finally, the effectiveness and robustness of the proposed method were verified from the deployment of UAV and communication energy consumption.At the same time, the factors effecting the effectiveness of the proposed method were analyzed.…”
    Get full text
    Article
  15. 17515

    The unionization process of police unions in Uruguay by Sabrina Calandrón, Santiago Galar, Mariana Da Silva Lorenz

    Published 2020-05-01
    “…In-depth interviews with key informants were conducted, and the information from two newspapers (2015-2018 period) made it possible to reconstruct facts and to give voices to important actors. Finally, institutional websites from unions were registered, which were complimented with information about laws and decrees related to the themes of analysis of the corpus.…”
    Get full text
    Article
  16. 17516

    Vers une transition énergétique des pays émergents : quelles politiques d’incitation aux énergies renouvelables dans le secteur électrique en Argentine et au Brésil ? by Germán Bersalli, Jean-Christophe Simon

    Published 2017-07-01
    “…Then, different objectives and possible negative effects of renewable energy development are analysed. Finally, the article focuses on renewable electricity policies in two selected countries, their scope, tools and effectiveness.…”
    Get full text
    Article
  17. 17517

    Essential and dual effects of Notch activity on a natural transdifferentiation event by Thomas Daniele, Jeanne Cury, Marie-Charlotte Morin, Arnaud Ahier, Davide Isaia, Sophie Jarriault

    Published 2025-01-01
    “…Our findings emphasise the importance of temporality and dynamics of the underlying molecular events preceding the initiation of natural cell reprogramming. Finally, our results support a model where both an extrinsic signal and the intrinsic cellular context combine to empower a cell with the competence to transdifferentiate.…”
    Get full text
    Article
  18. 17518

    Overhead Transmission Lines Deicing under Different Incentive Displacement by Qing He, Xi-feng Lv, Xiao-tong Zhao

    Published 2014-01-01
    “…Through the comparison of the compression strength experimental results on a series of different iced wires in low temperature environment, the authors found out that the stress generated from the wire icing area is greater than the crushing strength of the ice within the scope of the calculation parameters, which proved the validity and the feasibility of the method, and finally the suitable excitation displacement is determined. …”
    Get full text
    Article
  19. 17519

    Reliability Analysis of Tracked Vehicle Gear Transmission Box Considering Component Failure Correlation by Yan Sihong, Tao Fenghe, Jia Changzhi

    Published 2017-01-01
    “…The gear transmission box is reasonably divided by using the method of layer-by-layer analysis and using Matlab software to calculate the relevant parameters. Finally,the change regulation of life distribution function of gear transmission box system with time and the relevant parameters is obtained,which has a guiding significance for the design and maintenance of the transmission box.…”
    Get full text
    Article
  20. 17520

    Building mechanism of trusted virtual domain via the VPE by Li-na WANG, Hao ZHANG, Rong-wei YU, Han-jun GAO, Ning GAN

    Published 2013-12-01
    “…Due to lack of flexible networking control,most exiting trusted virtual domain deployment approaches fail to provide elastic and secure interconnection.A trusted virtual domain architecture TVD-VPE was proposed in cloud com-puting enterprises which greatly enhances sensitive data protection.TVD-VPE constructs a virtual private ethernet based on separate device driver,VPE captures network packets at the backend driver and checks whether the packets comply with border security strategy,and data frames are encrypted among trusted virtual domains to ensure the security of sensi-tive data.Simultaneously,four protocols were proposed,TVDJOP/TVDEXP protocol for any new VM joining in or exit-ing TVD securely,TVDMP protocol for deploying border cross-domain access.Finally,the prototype system and tests of its functionality and performance were implemented.The experiment results reveal that the architecture can effectively prevent unauthorized access between these trusted virtual domains,while introduces little overhead to Xen network performance.…”
    Get full text
    Article