Showing 208,301 - 208,320 results of 265,139 for search 'be*', query time: 1.25s Refine Results
  1. 208301

    Russian and Turkic Worlds in Eurasia by N. E. Demeshko, G. L. Muradov, A. A. Irkhin, O. A. Moskalenko

    Published 2024-01-01
    “…Employing a synthesis of critical and classical geopolitics methodologies, the study emphasizes the civilizational aspect as a pivotal element in the intricate interplay of competition and cooperation between Russia and Turkey in the Eurasian context. …”
    Get full text
    Article
  2. 208302

    Synchronous Vibration Parameters Identification of Variable Rotating Speed Blades Based on New Improved Two-Parameter Method without OPR Sensor by Liang Zhang, Huiqun Yuan, Xin Li

    Published 2021-01-01
    “…The results indicate that the standard errors of vibration parameter identification results between the new method and the method in reference are smaller, except for the initial phase. …”
    Get full text
    Article
  3. 208303

    Global knowledge gaps in acute febrile illness etiologic investigations: A scoping review. by Chulwoo Rhee, Grishma A Kharod, Nicolas Schaad, Nathan W Furukawa, Neil M Vora, David D Blaney, John A Crump, Kevin R Clarke

    Published 2019-11-01
    “…AFI case definitions between publications varied: use of self-reported fever as part of case definitions (28%, 53/190), fever cut-off value (38·0°C most commonly used: 45%, 85/190), and fever measurement site (axillary most commonly used: 19%, 36/190). …”
    Get full text
    Article
  4. 208304

    Reputation measurement: a tool for ski station applied to Isère Mountain by Céline Desmoulins

    Published 2020-12-01
    “…Academic scholarship relating to the benefits of reputation for an organisation provides a sound justification for the development of a measurement tool tailored to ski resorts. …”
    Get full text
    Article
  5. 208305

    Conservation Treatment and the Custodian/Conservator Relationship by Barbara Appelbaum

    Published 2008-10-01
    “…Collaboration between conservators and custodians is an important part of conservation treatment planning, particularly while deciding on the treatment goal. …”
    Get full text
    Article
  6. 208306

    Accuracy of Apple Watch in Measuring 30-Second Resting Electrocardiography in Patients with Cardiac Diseases and Comorbidity: An Observational Cross-Sectional Study by Khushhal AA, Mohamed AA, Alsegame MM, Alsaedi AM

    Published 2025-01-01
    “…The Apple Watch has recently been used to measure heart electricity via 30 seconds of ECG monitoring, but its validity is not known.Methods: A cross-sectional study included a sample of 112 patients with chronic disorders, including cardiac patients with sinus rhythm, cardiac patients with irregular heart rhythm, and patients with diabetes, hypertension, and dyslipidemia; their cardiac activity was investigated using the Apple Watch and ECG.Results: The correlations were strong between the Apple Watch and the 12-lead ECG in the heart rate, PR intervals, QT intervals, QRS complex, and RR intervals in all patients’ subcategories (cardiac, hypertension, diabetic, and dyslipidemia patients).Conclusion: The Apple Watch is valid for carrying out ECG in measuring the heart rate, PR intervals, QT intervals, QRS complex, and RR intervals of patients with cardiac and chronic diseases at rest; this may help in initial diagnosis for patients with cardiac diseases or those who are at risk of developing cardiac disease in the future.Keywords: Apple Watch, electrocardiography, cardiac diseases, chronic diseases…”
    Get full text
    Article
  7. 208307

    Reliability of mpMRI in diagnosing cancer prostate following intravesical BCG for bladder cancer by Arjun Pon Avudaiappan, Pushan Prabhakar, Rachel Siretskiy, Andrew Renshaw, Ahmed Eldefrawy, Murugesan Manoharan

    Published 2024-11-01
    “…Materials and Methods We reviewed the NMIBC patients treated with intravesical BCG therapy between 2017 and 2023 and investigated those who underwent mpMRI and MR fusion biopsy in suspicion of CaP. …”
    Get full text
    Article
  8. 208308

    Glaucoma and Corneal Transplant Procedures by Ammar M. Al-Mahmood, Samar A. Al-Swailem, Deepak P. Edward

    Published 2012-01-01
    “…The incidence reported is highly variable and a number of etiologic factors have been identified. A number of treatment options are available; surgical intervention for IOP control is associated with a high incidence of graft failure. …”
    Get full text
    Article
  9. 208309

    Effect of Aromatherapy using Lavender Oil on Audio and Visual Reaction Time: A Quasi-experimental Study by Saroj Chaudhary, Manjinder Kaur, Suman Sharma, Naren Kurmi, Khushboo Shrimali, Soniya Pipliwal, Muskan Singh

    Published 2025-01-01
    “…Introduction: Recently, the aromatheraphy has been a topic of interest in field of research and is reported to exert psychomodulatory effects through the limbic system. …”
    Get full text
    Article
  10. 208310

    Patterns of economically safe restructuring of Russian industry by I. V. Matskulyak, N. V. Sanin

    Published 2022-11-01
    “…A general conclusion has been formed, expressing the content of the main patterns of safe industrial restructuring as an economic concept and its objective foundations.…”
    Get full text
    Article
  11. 208311
  12. 208312

    Research on cloud computing users’ public safety trust model based on scorecard-random forest by Shengli ZHOU, Canghong JIN, Lifa WU, Zheng HONG

    Published 2018-05-01
    “…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
    Get full text
    Article
  13. 208313

    Application of blended learning in Islamic cultural history subjects to increase student learning interest by Zaimudin Zaimudin, Muhamad Ihza Pramudya

    Published 2024-02-01
    “…The background to this research is because students have low interest in learning, so this research aims to explore how to apply the blended learning method which seeks to increase students' interest in learning. …”
    Get full text
    Article
  14. 208314

    EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM by T Devapriya, V Ganesan, S Velmurugan

    Published 2024-12-01
    “…A scalable, lightweight algorithm that can detect and mitigate harmful behavior is the goal of this effort to improve network security. …”
    Get full text
    Article
  15. 208315

    Analysis and Strategies for the Impacts of the Rising of Mobile Internet Service on the Mobile Network by Tao Zhou, Zhen Shao, Leping Wei

    Published 2013-03-01
    “…In recent years, the popu1arity of inte11igent termina1s and diversification of data app1ications become a great impetus to the deve1opment of mobi1e internet.Undoubted1y, the success of mobi1e internet brings traffic benefit to operators, but it makes the wire1ess network encounter the unprecedented cha11enges and impacts.The interna1 mechanism of the traffic surge and signa1ing storm triggered by the rise of the mobi1e internet was ana1yzed from the operator's point of view,quantitative ana1ysis was made,and a variety of possib1e strategies was discussed.…”
    Get full text
    Article
  16. 208316

    A Case Report of Pulmonary Exacerbation after Initiation of Lumacaftor/Ivacaftor Therapy in a CF Female with Complicated Lung Disease by Elpis Hatziagorou, Eleana Kouroukli, Vasiliki Georgopoulou, John Tsanakas

    Published 2018-01-01
    “…In this report we document the case of a homozygous F508del CF patient with severe lung disease who presented with a pulmonary exacerbation shortly after the beginning of treatment with lumacaftor/ivacaftor and the complicated initial phase of therapy, which was followed by significant improvements.…”
    Get full text
    Article
  17. 208317

    Hidrocarburos y cambio climático: análisis del enfoque propuesto por la Resolución 40066 de 2022 by Iván Vargas-Chaves, Alexandra Cumbe-Figueroa, Claudia Martínez-Londoño

    Published 2024-03-01
    “…Introducción: Este artículo realiza un análisis jurídico de la Resolución 40066 de 2022 del Ministerio de Minas y Energía desde su implementación en el escenario normativo colombiano, los beneficios y retos que supone para las empresas del sector de hidrocarburos, y su acoplamiento jurídicamente con los contratos de exploración y explotación de hidrocarburos. …”
    Get full text
    Article
  18. 208318

    Quantum cryptanalysis of lightweight block cipher Piccolo by Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI

    Published 2023-06-01
    “…By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results show that the key can be recovered 56 bit with the time complexity 2 <sup>28</sup> and the occupation of 464 qubit.Moreover, if attack rounds r>6,the time complexity is 2 <sup>28+16(r-6)</sup>, which is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>68</mn></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of Grover quantum brute-force search.The time complexity of the proposed attack method is significantly reduced compared with Grover search and is also better than that of traditional cryptanalysis, which lays a foundation for the subsequent research on quantum attacks of lightweight block ciphers.…”
    Get full text
    Article
  19. 208319

    The Effect of Contaminants and Temperatures of a High-Palm-Oil Biodiesel Blend on the Lifetime of a Diesel Fuel Filter by Ihwan Haryono, Muchammad Taufiq Suryantoro, Ade Kurniawan, Muhammad Ma’ruf, Budi Rochmanto, Hari Setiapraja, Ahmad Taufiqur Rohman, Respatya Teguh Soewono, Taufik Yuwono, Ahmad Syihan Auzani

    Published 2025-01-01
    “…The use of a high concentration of biodiesel blends has been implemented nationally in Indonesia as part of the government’s program to increase energy security and improve environmental quality. …”
    Get full text
    Article
  20. 208320

    Commercial Diplomacy and Internationalization of SMEs: A Scoping Review by Fatima Alsuwaidi, Muhammad Raziq, Uzma Batool

    Published 2024-10-01
    “…Our review not only offers a comprehensive analysis of the current research on the relationship between CD and SME internationalization, but also identifies key themes. …”
    Get full text
    Article