Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
2821
High-resolution Cryo-EM Structure Determination of a-Synuclein—A Prototypical Amyloid Fibril
Published 2025-02-01“…Studies of patient-derived brain tissues have concluded that these inclusions are associated with Parkinson’s disease, the second most common neurodegenerative disorder, and other synuclein-related diseases called synucleinopathies. …”
Get full text
Article -
2822
Study on Impact Tendency of Coal and Rock Mass Based on Different Stress Paths
Published 2020-01-01“…With the increased mining depth, the dynamic disaster of rock burst in coal mines has become increasingly prominent, and the impact tendency of coal and rock mass in deep coal seam mining is a necessary condition for the occurrence of rock burst and an important index to measure the failure of coal and rock mass. …”
Get full text
Article -
2823
Appropriateness of Antiplatelet Therapy and Proton Pump Inhibitor Prescribing in End-Stage Kidney Disease: A Retrospective Quality Investigation Study
Published 2025-01-01“…Out of 4 patients on DAPT, 3 had current indications for DAPT, whereas 1 had a prior indication. …”
Get full text
Article -
2824
Mediators of Inflammation and Their Effect on Resident Renal Cells: Implications in Lupus Nephritis
Published 2013-01-01“…Of these, type I interferons (IFNs) can increase both gene and protein expression of cytokines and chemokines associated with lupus susceptibility, and interleukin-6 (IL-6), tumor necrosis factor-α (TNF-α) and hyaluronan have been shown to elicit both pro- and anti-inflammatory effects on infiltrating and resident renal cells depending on the status of their microenvironment. …”
Get full text
Article -
2825
Keys to Successfully Choosing Enterprises That Suit Your Small Farm
Published 2008-01-01“…HS-1121, an 11-page fact sheet by Robert Hochmuth, Larry Halsey, George Hochmuth, Chad Hutchinson, and Linda Landrum, helps farmers begin the decision-making process of evaluating alternative enterprises. …”
Get full text
Article -
2826
Progress on neuromodulation for treatment of essential tremor
Published 2025-01-01Get full text
Article -
2827
Cooperative transmission scheme based on GSC for cognitive wireless sensor network
Published 2013-09-01“…In response to the features that the sensor nodes are gy-limited and power-constrained in wireless sensor network,a cooperative transmission scheme based on general selection combine(GSC)algorithm was proposed when the channel state information (CSI) was known to the transmitter.The number of cooperative nodes was depended on the GSC algorithm subject to a power constraint at the transmitter,and these selected nodes were scheduled according to the channel sate and individual residual energy.The analys lation results show that the proposed scheme can effectively prolong the network lifetime.…”
Get full text
Article -
2828
Distributed key sharing based scheme for security clustering in unattended wireless sensor network
Published 2015-05-01“…For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.…”
Get full text
Article -
2829
Permeability Characteristics of Tailings considering Chemical and Physical Clogging in Lixi Tailings Dam, China
Published 2016-01-01“…The results of chemical clogging column experiments show that ferrous ion solution concentration is disproportional to the permeability coefficient. This scenario can be attributed to the extremely small concentration gradients.…”
Get full text
Article -
2830
A Novel Prediction Model for Car Body Vibration Acceleration Based on Correlation Analysis and Neural Networks
Published 2018-01-01“…This paper aims to create a prediction model for car body vibration acceleration that is reliable, effective, and close to real-world conditions. …”
Get full text
Article -
2831
UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design
Published 2025-01-01Subjects: “…UAV inspection…”
Get full text
Article -
2832
Flow Mechanism and Strength Characteristics of Textile Reinforced Concrete Mixed with Colloidal Nano-SiO2
Published 2021-01-01“…It is found by electron microscope scanning that the incorporation of CNS consumes more Ca(OH)2, refines the Ca(OH)2 crystal size, and generates more C-S-H gels. …”
Get full text
Article -
2833
A file archival integrity check method based on the BiLSTM + CNN model and deep learning
Published 2025-03-01“…Researching in archives raises ethical issues while having little to do with individuals. Traditional archive integrity solutions have scaling issues, real-time monitoring issues, and missed opportunities. …”
Get full text
Article -
2834
Sparse channel fast reconstruction algorithm for OFDM system based on IOC-CSMP
Published 2023-02-01“…A fast reconstruction algorithm based on inner product optimization and sparsity updating constraint was proposed for OFDM system channel estimation when the number of channel paths was unknown.By constructing and updating the selection vector, the inner product operation was reduced by using the atoms corresponding to the non-zero index of the selection vector.The atoms were optimized based on compressed sampling and backtracking strategies, and the channel estimation was completed by matching pursuit.The sparsity update and the stop condition for the algorithm was achieved by the energy difference between the two adjacent channel estimation so as to ensure fast convergence of the algorithm.The simulation results show that the proposed algorithm has better channel estimation performance than the least square algorithm, minimum mean square error algorithm, sparsity adaptive matching pursuit algorithm and adaptive regularized compressed sampling matching pursuit algorithm, and consumes less channel estimation time than the two adaptive methods.…”
Get full text
Article -
2835
Optimizing Natural Image Quality Evaluators for Quality Measurement in CT Scan Denoising
Published 2025-01-01Get full text
Article -
2836
Design of Continuously Variable Transmission Sprocket Wheel
Published 2020-02-01“…Then the functional relationship between the diameter change of the dividing circle of the active sprocket and the spring compression is obtained through calculation. …”
Get full text
Article -
2837
Master S-N curve method to fatigue damage assessment of the high-ply cutter body
Published 2024-12-01Subjects: “…Master S-N curve…”
Get full text
Article -
2838
Narrowing the semantic gap in virtual machine introspection
Published 2015-08-01“…Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap restoration,a method called ModSG was proposed to bridge the semantic gap.ModSG was a modularity system,it divided semantic restoration into two parts.One was online phase that interact directly with user to construct semantic views,the other was offline phase that only interact with operating system to parse high-level semantic knowledge.Both were implemented via independent module,and the latter provided the former with necessary kernel information during semantic view construction.Experiments on different virtual machine states and different kernel versions show that the ModSG is accurate and efficient in narrowing semantic gap.The modular design and deployment also make ModSG easily to be extended to other operating systems and virtualization platforms.…”
Get full text
Article -
2839
-
2840
Next-generation mmWave WLAN: vision and key enabling technologies
Published 2023-09-01“…With the rapid development and wide applications of information and communication technologies, human production and life and social governance are evolving in the direction of digitizing, informatization, and intelligence.As one of the most widely applied wireless communication technologies, the wireless local area network (WLAN) needs to make further breakthroughs in the key performance such as data throughput, reliability, and latency and needs to add sensing functions and intelligence.The huge frequency resources of the millimeter wave (mmWave) band have injected new momentum into the development of WLAN.But the mmWave WLAN has also brought new technical challenges and requirements.Firstly, the WLAN development history was reviewed, and network structures, typical applications, development directions, and performance index requirements of WLAN in the future were summarized.Then, the characteristics of wireless channels in the mmWave band were given, and the new requirements and challenges for mmWave WLAN design were analyzed.Finally, some potential key technologies that may meet these challenges and requirements were discussed and prospected.…”
Get full text
Article