-
2601
Outcome of Precontoured Titanium Mesh in the Reconstruction of Orbital Blowout Fractures
Published 2023-02-01“…Background Orbital blowout fractures are peculiar injuries causing disruption of both ocular function and symmetry. We present our experience with the use of a precontoured titanium mesh in orbital blowout fractures. …”
Get full text
Article -
2602
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…Additionally, the security level of the proposed system performs better in terms of integrity, privacy, authentication, access control, and cryptographic function. …”
Get full text
Article -
2603
PTOV1 interacts with ZNF449 to promote colorectal cancer development
Published 2025-03-01“…TCGA, NCBI/GEO, and Kaplan–Meier plot database mining provided important clues into the function and clinical importance of PTOV1 in CRC. Western blotting, immunohistochemistry, and immunofluorescence were utilized to discover PTOV1 protein levels in CRC cell lines and tissues. …”
Get full text
Article -
2604
Recommendations for Success in Forming and Maintaining a SoTL Community of Practice
Published 2025-02-01“…We used Participatory Action Learning and Action Research (PALAR) principles to form and function our CoP. After two years of successfully maintaining our SoTL CoP, we analysed the data gathered during our meetings. …”
Get full text
Article -
2605
X-ray of agricultural development programme and food security in Nigeria
Published 2025-06-01“…To achieve this feat, several mechanisms are also put in place to make the strategies function effectively and efficiently but despite these, food security is still a challenge in Ogun State. …”
Get full text
Article -
2606
Research of UAV 3D path planning based on improved Dwarf mongoose algorithm with multiple strategies
Published 2025-07-01“…Comparative evaluations on benchmark test functions demonstrate that the improved algorithm (CDMOS) outperforms the original DMO in optimization performance, convergence precision, and overall stability, achieving an average improvement of 53.5% in convergence accuracy and 35.1% in solution stability across 29 benchmark functions. …”
Get full text
Article -
2607
The stability and self-assembly of tri-calcium silicate and hydroxyapatite scaffolds in bone tissue engineering applications
Published 2025-02-01“…The stability and self-assembly were assessed through several parameters, such as the solvent-accessible surface area (SASA), radius of gyration (Rg), radial distribution function (g(r)), root-mean-square deviation (RMSD), root-mean-square fluctuation (RMSF), hydrogen bonding, van der Waals, electrostatic, and total energies. …”
Get full text
Article -
2608
Integrated Bidding and Battery Scheduling in a Microgrid for Sealed-Bid Double Auction Power Trading With Peer Microgrids Under Uncertainty and Its Blockchain-Based Implementation
Published 2025-01-01“…We also propose a fully decentralized and tamper-resistant execution architecture based on a consortium blockchain, where multiple aggregator agents within each microgrid, representing renewable sources, loads, storage systems, and the bid agent, function as independent blockchain nodes. …”
Get full text
Article -
2609
Minimization of the Bacillus subtilis divisome suggests FtsZ and SepF can form an active Z-ring, and reveals the amino acid transporter BraB as a new cell division influencing fact...
Published 2025-01-01“…After extensive phenotypic testing of these mutations, we found an unexpected cell division regulation function for the branched chain amino acid transporter BraB, which may be related to a change in fatty acid composition. …”
Get full text
Article -
2610
An Integrated Lateral and Longitudinal Decision-Making Model for Autonomous Driving Based on Deep Reinforcement Learning
Published 2023-01-01“…By setting a reasonable state, action, and reward function, this paper has carried out a large number of simulation experiments on the proposed autonomous driving decision-making model based on deep reinforcement learning in a three-lane road environment. …”
Get full text
Article -
2611
Possibilities of using the digital currency of the central bank in concessional lending to the agro-industrial complex
Published 2023-07-01“…The purpose of the study is to identify possible effects from the use of the digital ruble for industry borrowers, the budget and banking system through the digitalization of transactions between participants in multilateral interaction and strengthening the control function. The relevance of the study is associated with a prospective assessment of the possibilities of digital modernization of existing areas of state financial support for agriculture, opened by the circulation of the digital form of the Russian ruble. …”
Get full text
Article -
2612
Navigating the Path to Recovery: A Scoping Review of Return to Work Program for Manufacture Workers After Occupational Injury
Published 2023-12-01“…The findings of this comprehensive review indicate that return-to-work programs when meticulously crafted and effectively executed, possess the capacity to assume a pivotal function in facilitating the reintegration of injured workers into the workforce, while concurrently enhancing their holistic health outcomes. …”
Get full text
Article -
2613
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
2614
Melacak Nasib Citra Daerah: Analisis Keterangan Akhir Pada Jadwal Retensi Arsip
Published 2024-12-01“…Results: There were variations were found in the final decision components which are recommendations for the execution of records disposal, namely destroyed, permanent, re-appraisal, and others. …”
Get full text
Article -
2615
Safety, efficacy and health impact of electronic nicotine delivery systems (ENDS): an umbrella review protocol
Published 2024-01-01“…Although they were initially introduced as an alternative to traditional smoking, the design and function of ENDS vary. The potential health effects of ENDS, especially in comparison to traditional cigarettes, are a matter of ongoing debate. …”
Get full text
Article -
2616
Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code
Published 2025-06-01“…In this paper, we present a principled solution that leverages DOIT to enable cryptographic software that is future-proof constant-time, in the sense that it ensures that only instructions from the DOIT subset are used to operate on secret data, even during speculative execution after a mispredicted branch or function return location. …”
Get full text
Article -
2617
BCDCNN: breast cancer deep convolutional neural network for breast cancer detection using MRI images
Published 2025-08-01“…Afterwards, feature extraction is done and finally, BCD is conducted employing BCDCNN, wherein the loss function is newly designed based on an adaptive error similarity. …”
Get full text
Article -
2618
“The city’s speech”: Analysis of Novosibirsk graffiti
Published 2025-04-01“…Graffiti not only serves a communicative function but also reflects current social and cultural processes. …”
Get full text
Article -
2619
Tactical and Criminalistic Features of Conducting a Physical Examination during the Verification of Crime Reports
Published 2025-07-01“…As a result, each permissible action assumes heightened importance due to its unique and often irreplaceable function. Examination belongs to the category of investigative measures legally allowed during the initiation stage, and this article explores its tactical and forensic-specific aspects within that context. …”
Get full text
Article -
2620
Real-Time Object Detection Using Low-Resolution Thermal Camera for Smart Ventilation Systems
Published 2025-01-01“…To address the scarcity of thermal data, we developed the TOI (Thermal Object Insertion) data augmentation technique, which generates new training data while preserving thermal pattern characteristics. A composite loss function combining box, classification, and confidence losses was implemented to enhance object detection performance. …”
Get full text
Article