Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
2121
-
2122
Human Flea Pulex irritans Linnaeus, 1758 (Insecta: Siphonaptera: Pulicidae)
Published 2022-11-01“…The human flea is cosmopolitan (Mullen and Durden 2019, Gage 2005, Marquardt et al. 2000), but is found in highest abundance in areas where it can readily find mammalian hosts. Though its relative abundance and overall medical importance is disputed, this flea has been implicated as a potentially important vector of the human pathogens causing plague and murine typhus as well as serving as a potential vector of a tapeworm known to parasitize humans (Eldridge and Edman 2004). …”
Get full text
Article -
2123
Development of Deep Convolutional Neural Network with Adaptive Batch Normalization Algorithm for Bearing Fault Diagnosis
Published 2020-01-01“…Many previous works using a deep convolutional neural network (CNN) have achieved excellent performance in finding fault information from feature extraction of detected signals. …”
Get full text
Article -
2124
Spectrum sharing schemes in cognitive radio networks based on collusion formation
Published 2014-03-01“…When multiple primary network (PN) with different interests competes to offer spectrum access opportunities for a single secondary network,a spectrum sharing scheme based on a repeated game model could be adopted to form a colluded monopoly for the licensed spectrum so as to maximize their total transmission utility.However,when a does not value its future transmission utility enough,it might choose to deviate from the present colluded monopoly to obtain a transmission utility larger than its monopoly utility,which then reduces the current and future transmission utilities of all other PN.Two new strategies were thereby proposed to produce a more flexible and credible spectrum sharing monopoly among all PN.Numerical simulation shows that,compared with the existing triggering strategy,the proposed strategies can effectively increase the overall transmission utility of all PN.…”
Get full text
Article -
2125
Signal integrator function of CXXC5 in Cancer
Published 2025-01-01“…CXXC5 acts as a regulator in various physiological processes, and abnormalities in its protein structure or function have been linked to multiple pathological processes. …”
Get full text
Article -
2126
Therapeutic landscape for inherited ocular diseases: current and emerging therapies
Published 2023-01-01“…Recent success in adeno-associated virus-based gene therapy, voretigene neparvovec (Luxturna®) for RPE65-related IRDs, has heralded rapid evolution in gene therapy platform technologies and strategies, from gene augmentation to RNA editing, as well as gene agnostic approaches such as optogenetics. …”
Get full text
Article -
2127
General Equation for Expressing the Physicochemical Properties of Aliphatic Alcohols
Published 2025-01-01Get full text
Article -
2128
Spectrum allocation of cognitive wireless network based on immune clone selection optimization
Published 2010-01-01Get full text
Article -
2129
A Graph Convolutional Network-Based Sensitive Information Detection Algorithm
Published 2021-01-01Get full text
Article -
2130
Privacy preserving algorithm based on trajectory location and shape similarity
Published 2015-02-01“…In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature.…”
Get full text
Article -
2131
Efficient quantum signature protocol of classical messages
Published 2007-01-01Get full text
Article -
2132
Rate control algorithm for no-feedback distributed video coding
Published 2014-06-01“…The simulation results show that compared with the existed methods, the proposed algorithm can improve the quality of side information estimation considerably especially for the middle-high motion video sequences and in-crease the average PSNR (peak signal-to-noise ratio) of decoded video.…”
Get full text
Article -
2133
Intrafamilial Spread of Hepatitis B: Passage Through Several Generations
Published 1993-01-01Get full text
Article -
2134
Heterogeneous Social Linked Data Integration and Sharing for Public Transportation
Published 2022-01-01“…Solid (social linked data) technology has made significant progress in social web applications developed, such as Facebook, Twitter, and Wikipedia. …”
Get full text
Article -
2135
PREDICTION AND DAMAGE ANALYSIS OF THE POSTBUCKLING FOR MULTI-SPAR COMPOSITE BOX
Published 2018-01-01“…as multi-spar composite box has been used for many airplanes,in order to assure structure security,it is necessary to study the mechanical properties of multi-spar composite box. …”
Get full text
Article -
2136
Embracing peer review of teaching: promoting the ‘why’ within third space education.
Published 2025-01-01“… This case study explores how a Learning Development team has moved from a peer-observation to a peer-review process over the last five years, examining the rationale, development, and impact of the change in approach. …”
Get full text
Article -
2137
An Energy-Efficient Pipeline-SAR ADC Using Linearized Dynamic Amplifiers and Input Buffer in 22nm FDSOI
Published 2025-01-01“…Measurements showed the ADC achieved a signal-to-noise-distortion ratio (SNDR) of 37 dB at 920 MS/s consuming a total power of 1.8mW for a Walden FOM (FOMW) of 34.9 fJ/conv. With the input buffer, the achieved FOMW is 68.4 fJ/conv. …”
Get full text
Article -
2138
-
2139
AMEND 2.0: module identification and multi-omic data integration with multiplex-heterogeneous graphs
Published 2025-02-01“…Abstract Background Multi-omic studies provide comprehensive insight into biological systems by evaluating cellular changes between normal and pathological conditions at multiple levels of measurement. …”
Get full text
Article -
2140
A Pelvic Abscess and a Pelvic Stone Secondary to a Ureteral Calculus
Published 2024-01-01“…Minimally invasive treatments have minimal damage to the body and are widely applicable, and the patient was cured by one of them, abscess aspiration, which implies that they can also be used for patients who cannot tolerate surgical procedures.…”
Get full text
Article