-
2841
Designing Electronic Systems Using SystemC and SystemC–AMS
Published 2020-08-01“…For the joint design and simulation of digital systems hardware and software, seven modeling levels are presented and discussed: executable specification, disabled functional model, temporary functional model, transaction-level model, behavioral hardware model, accurate hardware model, register transfer model. …”
Get full text
Article -
2842
Cellular Factors Targeting APCs to Modulate Adaptive T Cell Immunity
Published 2014-01-01“…Depending on the cytokines present during the initial T cell activation, T cells become effector cells that produce different effector molecules and execute adaptive immune functions. Studies thus far have primarily focused on defining how these factors control T cell differentiation by targeting T cells themselves. …”
Get full text
Article -
2843
Research on technology of data encryption and search based on access broker
Published 2018-07-01“…Broker executed searchable encryption (BESE) scheme was proposed for the confidentiality issues of cloud application data.The scheme did not need to modify the cloud application or user habits,thus had strong applicability.Firstly,systematic and quantitative analysis on BESE scheme was conducted in terms of query expressiveness,performance and security.Then,the main challenges of BESE scheme including securely sharing index and encrypted data between brokers were pointed out,and corresponding schemes were proposed to address the above challenges.The experimental results show that the BESE scheme can effectively protect the user data in the cloud,achieve a variety of search functions,and has high efficiency and security.…”
Get full text
Article -
2844
Protocol for isolating and characterizing human vitreous immune cell infiltrates by flow cytometry and single-cell transcriptomic studies
Published 2025-06-01“…Summary: Vitreous infiltrating immune cells represent an accessible tissue sample that can provide valuable information on the intraocular immune response without compromising the structural and functional integrity of the eye. Here, we present our customized protocol for isolating and characterizing vitreous immune cell infiltrates by flow cytometry and single-cell transcriptomics. …”
Get full text
Article -
2845
Protocol for assessing the structural architecture, integrity, and cellular composition of murine bone ex vivo
Published 2025-06-01“…We describe steps for imaging and analyzing bone by micro-computed tomography (CT) and functionally testing bone strength through three-point bending. …”
Get full text
Article -
2846
Combining different types of binary operations in the nonposition calculators
Published 2022-09-01“…Operation of device is discussed in various modes of functioning. Simultaneous execution additive and multiplicative operations are based on the use of index theory, as well as the expansion the number of the operands for the two degree. …”
Get full text
Article -
2847
On a Nonstationary Route Problem with Constraints
Published 2015-02-01“…It is supposed that an executer leaves the initial point (the base) after which he visits a system of megalopolises (finite goal sets) and performs some work on each megalopolis. …”
Get full text
Article -
2848
STUDY OF PERSONNEL REACTION ON IMPLEMENTATION OF CORPORATE GOVERNANCE DIGITALIZATION PROGRAMS
Published 2020-06-01“…The national digitalization program determines the radical transformation of information support and administrative support for the implementation of the functions and procedures of managers, specialists and executives of the management apparatus. …”
Get full text
Article -
2849
KNOWLEDGE INTEGRITY IN METHODOLOGY OF INTELLECTUAL SCIENTIFIC-RESEARCH SYSTEMS
Published 2010-12-01“…An analysis of integrity notion functioning has been executed while considering a problem on relationship of general and partial components. …”
Get full text
Article -
2850
Reflections, operational lessons, and practical insights from a pharmacovigilance inspection: a case example of organizational strategies for medical safety readiness
Published 2025-08-01“…Despite their significance, there is limited published guidance on how organizations—particularly Medical Safety functions—can prepare operationally for such inspections. …”
Get full text
Article -
2851
Ultralight Situation-Aware Hypervisor With Adaptive Starvation-Free Feedback Control for Embedded System
Published 2025-01-01“…To mitigate the temporal overhead of determining time quanta, the design incorporates memory and functional isolation, significantly reducing context switching overhead. …”
Get full text
Article -
2852
THE INSTITUTION OF COMPLAINTS WITH AN ADMINISTRATIVE-JUDICIAL CHARACTER MADE BY THE PERSONS DEPRIVED OF THEIR LIBERTY TO PROTECT THEIR RIGHTS AND INTERESTS
Published 2018-05-01“…In order to ensure the unitary application of these fundamental principles, the Romanian legislator, through Law no.254 / 2013, paid due attention to this category of persons, the new law being in line with the legislative changes that were made, as well as the European recommendations on the treatment of detainees, of Human Rights or the laws of other states regarding of the execution of sentences ordered by the court. These European regulations, among other things, have made substantial improvements to the regulations on ensuring the normal functioning of the Romanian penitentiary regime, especially as regards the right of persons deprived of their liberty to information, to fill complaints. …”
Get full text
Article -
2853
QELPS Algorithm: A Novel Dynamic Optimization Technology for Quantum Circuits Scheduling Engineering Problems
Published 2025-06-01“…Meanwhile, FJOSA employs a cross-layer optimization strategy that combines heuristic algorithms with cost functions to improve gate scheduling at a global level. …”
Get full text
Article -
2854
RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency
Published 2025-06-01“…Performance assessments show that RiceChain-Plus surpasses existing benchmark models, achieving the lowest average execution costs (44,634 gas), reduced energy consumption (9.38828E−05 J), higher throughput (0.071201 transactions/s), faster execution (44.5 ms), and quicker transaction times (14.045 s), while also improving scalability. …”
Get full text
Article -
2855
RESEARCH OF ACID TRANSACTION IMPLEMENTATION METHODS FOR DISTRIBUTED DATABASES USING REPLICATION TECHNOLOGY
Published 2021-06-01“…The obtained results allowed to make functions of dependence of the considered metrics on loading parameters. …”
Get full text
Article -
2856
Comparative analysis of methods for testing web applications
Published 2023-09-01“…Nonetheless, the best comprehensive code analysis and protection against unwanted functional changes can be achieved by employing all known types of tests. …”
Get full text
Article -
2857
Development of a Mobile Application for Musculoskeletal Rehabilitation Based on Computer Vision and Inertial Navigation Technologies
Published 2024-11-01“…The results obtained can be used for evaluating outpatient rehabilitation and as a basis for more complex and functional mobile systems for musculoskeletal rehabilitation.…”
Get full text
Article -
2858
Development of system of financial control in the Russian Federation
Published 2020-01-01“…Increase of efficiency offinancial control, in fair opinion of the author, should be cost not only on the basis of strengthening offiscal functions of the numerous state structures which are carrying out control of execution ofbudgetary powers, but also, first ofall, on all-round state support state and the private enterprises creating a material basis of development of a society, the state and citizens, including, and in theform of the stimulatingfinancial control, capable to render by it the timely help.…”
Get full text
Article -
2859
Structural and Experimental Study of a Multi-Finger Synergistic Adaptive Humanoid Dexterous Hand
Published 2025-03-01“…As the end-effector of a humanoid robot, the dexterous hand plays a crucial role in the process of robot execution. However, due to the complicated and delicate structure of the human hand, it is difficult to replicate human hand functionality, balancing structural complexity, and cost. …”
Get full text
Article -
2860
Comparative overview of European Pharmacopoeia and United States Pharmacopoeia requirements for validation of alternative microbiological methods
Published 2025-06-01“…Pharmacopoeial microbiological methods, foundational to the functioning of the pharmaceutical facilities, are limited by the time required for analysis, which is associated with significant costs. …”
Get full text
Article