Suggested Topics within your search.
Suggested Topics within your search.
-
1001
Clonal divergence and genomic meltdown in prostatic pleomorphic giant cell adenocarcinoma
Published 2025-08-01“…BackgroundPleomorphic giant cell adenocarcinoma (PGCA) of the prostate is a rare, aggressive variant characterized by multinucleated giant cells, sarcomatoid features, and resistance to conventional therapies. …”
Get full text
Article -
1002
-
1003
-
1004
Efficient Image Processing Technique for Detecting Spatio-Temporal Erosion in Boron Nitride Exposed to Iodine Plasma
Published 2025-06-01“…This study introduces an efficient image processing technique to monitor the evolution of the erosion depth in boron nitride (BN) subjected to multiple cycles of iodine plasma exposure. …”
Get full text
Article -
1005
Experience of Paleotectodynamic Analysis of Rank Components of Mesozoic-Cenozoic Movements and Deformations Using the Example of the Central Part of Bukharo-Khiva Region
Published 2024-06-01“…The previously unknown features of the structural plans of different horizons and their evolution in the Mesozoic – Cenozoic history were established. …”
Get full text
Article -
1006
-
1007
Research on traffic representation in network anomaly detection
Published 2025-01-01“…Subsequently, the evolution of traffic representation in network anomaly detection was systematically reviewed, providing a comprehensive analysis of its forms, feature learning, and application in anomaly detection both globally and domestically. …”
Get full text
Article -
1008
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
1009
Nature of the creative class of a cognitive society: conceptual aspect
Published 2024-12-01“…The author has revealed the constructive features of the creative class, capable of playing a decisive role in the management segment. …”
Get full text
Article -
1010
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
1011
Spiral Dynamics of the Development of the Process of Intellectualization in the Context of Globalization Changes: Methodological Aspects
Published 2024-06-01“…The article discusses the features of the development of the process of intellectualization in the context of globalization changes through the prism of the theory of spiral dynamics. …”
Get full text
Article -
1012
Specifics of Advertising Communication in the Second Half of 19<sup>th</sup> Century (by Example of “Nature and Hunting” Magazine)
Published 2019-04-01“…An attempt is made to trace the evolution of the advertisement genre in the history of the Russian language, as a result of which the advertisement is qualified as a “secondary speech genre.” …”
Get full text
Article -
1013
Forensic Comparison of Acoustic Voice Samples Recorded in Different Mobile Phone Devices: A Preliminary Study
Published 2025-01-01“…The widespread accessibility of mobile phone devices, be it Android, iOS, or Feature phone, has significantly increased the prevalence of voice evidence in criminal cases. …”
Get full text
Article -
1014
-
1015
Predictive performance and uncertainty analysis of ensemble models in gully erosion susceptibility assessment
Published 2025-06-01“…Gully erosion, as a significant natural process in geomorphological evolution, poses serious threats to natural environments and socio-economic stability. …”
Get full text
Article -
1016
Témoins archéologiques de l’estive médiévale et moderne : évolution typo-chronologique et spécificités de l’habitat agropastoral sur le haut Forez entre le xie s. et le xviiie s. (...
Published 2024-07-01“…The typo-chronological evolution of the settlements and their architectural features reflects a progressive structuring of pastoralism closely linked to the needs and orientations of the regional economy (Forez, Dore, Limagne). …”
Get full text
Article -
1017
-
1018
Model for the assessment of rectangular reinforced concrete columns with limited confinement details
Published 2025-09-01Get full text
Article -
1019
Clinical application of Baizhu Houpu Decoction in treatment of chronic kidney disease in the Ji Hai year
Published 2020-01-01“…Chronic kidney disease(CKD) is a slowly-progressing disease of chronic disorders of renal structures and functions arising from various causes(renal injury for more than 3 months),which may affect physiological functions of many systems in the human body.Our supervisor investigated the Qi running features and pathogenesis characteristics of patients with CKD,based on the theory of the doctrine of five evolutive phases and six climatic factors,and applied the six Ji-year recipe Baizhu Houpu Decoction to treatment of CKD patients and achieved good efficacy.The study has provided a new approach and method for treatment of CKD.…”
Get full text
Article -
1020
Evolution of Griffiths-like Anomaly in Isostructural Swedenborgite Compounds Ho<sub>1−<i>x</i></sub>Er<sub><i>x</i></sub>BaCo<sub>4</sub>O<sub>7+<i>δ</i></sub>
Published 2025-06-01“…To explore the curious disappearance of such an anomalous feature in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>ErBaCo</mi><mn>4</mn></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi mathvariant="normal">O</mi><mrow><mn>7</mn><mo>+</mo><mi>δ</mi></mrow></msub></semantics></math></inline-formula>, we prepared a series of compounds with varying compositions <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>Ho</mi><mrow><mn>1</mn><mo>−</mo><mi>x</mi></mrow></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>Er</mi><mi>x</mi></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>BaCo</mi><mn>4</mn></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi mathvariant="normal">O</mi><mrow><mn>7</mn><mo>+</mo><mi>δ</mi></mrow></msub></semantics></math></inline-formula> (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0</mn><mo>≤</mo><mi>x</mi><mo>≤</mo><mn>1</mn></mrow></semantics></math></inline-formula>) and systematically studied the evolution of various physical properties as a function of Er-doping. …”
Get full text
Article