Suggested Topics within your search.
Suggested Topics within your search.
- History 9
- Social conditions 6
- Criminal law 4
- Mass media 4
- Philosophy 4
- Politics and government 4
- Economic development 3
- Information technology 3
- Jews 3
- Management 3
- Moneylenders 3
- Moral and ethical aspects 3
- Study and teaching 3
- Advertising 2
- Agriculture 2
- Civilization 2
- Colonial influence 2
- Constitutional law 2
- Democracy 2
- Economic aspects 2
- Economic policy 2
- Geology 2
- History and criticism 2
- Internet in public administration 2
- Law 2
- Manners and customs 2
- Marketing 2
- Natural resources 2
- Poetics 2
- Psychological aspects 2
-
90581
Deep Reinforcemnet Learning for Robust Beamforming in Integrated Sensing, Communication and Power Transmission Systems
Published 2025-01-01“…Deep reinforcement learning (DRL), a machine learning technique where an agent learns by interacting with its environment, offers a promising approach that can dynamically optimize system performance through adaptive decision-making strategies. …”
Get full text
Article -
90582
Markov game modeling of mimic defense and defense strategy determination
Published 2018-10-01“…Network mimic defense technology enhances the robustness of active defense through the redundancy,dynamic and diversity as well as the decision feedback mechanism.However,little work has been done for its security assessment and existing classic game models are not suitable for its dynamic characteristics and lack of universality.A Markov game model was proposed to analyze the transfer relationship between offensive and defensive status and the measurement method of safety and reliability of mimic defense,and calculated the offensive and defensive game equilibrium through non-linear programming algorithm to determine the best defensive strategy considering performance.Experiments give a comparison with the multi-target hiding technique and shows that the mimic defense has a higher defensive effect.Combining with the specific network case,the specific attack and defense path for the exploit of the system vulnerability is given and the effectiveness of the defense strategy algorithm is verified.…”
Get full text
Article -
90583
A Multiplex Approach Against Disturbance Propagation in Nonlinear Networks With Delays
Published 2024-01-01Get full text
Article -
90584
Deep Penetration of Shear Deformation in Ferritic Stainless Steel via Differential Speed Rolling Considering Contact Condition
Published 2024-12-01“…Rolling is a widely utilized industrial processing method, and understanding its inherent characteristics can optimize the process and help achieve the desired microstructure and texture. …”
Get full text
Article -
90585
ĮVAIRIŲ GEODEZINIŲ METODŲ PANAUDOJIMO KELIŲ AUKŠČIŲ MATAVIMAMS ANALIZĖ
Published 2018-12-01“…Matuojant kelio aukščius neišvengiamos aukščių matavimo paklaidos, kurios daro įtaką kelio konstrukcijų storiui. Konstrukcijų storis daro įtaką viso kelio stiprumui, ilgaamžiškumui ir jo kainai. …”
Get full text
Article -
90586
The relation between religion and politics in Machiavelli's thought
Published 2024-01-01“…The second part will examine Machiavelli's understanding of religion, primarily based on its role in the development of the early Roman state. …”
Get full text
Article -
90587
Resistance of <i>Wolbachia</i> to Trimethoprim: Insights into Genes Encoding Dihydrofolate Reductase, Thymidylate Synthase and Serine Hydroxymethyltransferase in the Rickettsiales
Published 2024-12-01“…The exclusive use of FAD-TS suggests that <i>Wolbachia</i> DHFR provides a supplementary rather than an essential function for de novo synthesis of dTMP, possibly reflecting the relative availability of, and competing demands for, FAD and NAD coenzymes in the diverse intracellular environments of its hosts. Whether encoded by <i>thyA</i> or <i>thyX</i>, TS produces dTMP by transferring a methyl group from methylene tetrahydrofolate to dUMP. …”
Get full text
Article -
90588
Aspartate aminotransferase to platelet ratio correlates with poor prognosis and metabolic alterations in Dabie bandavirus infection
Published 2025-01-01“…This study aimed to examine the correlation between APRI and SFTS prognosis using clinical data analysis and attempt to explain its prognostic significance through metabolic analysis.MethodsData from hospitalized patients with a confirmed diagnosis of SFTS virus infection at Wuhan Union Hospital were retrospectively collected. …”
Get full text
Article -
90589
Contact-dependent growth inhibition (CDI) systems deploy a large family of polymorphic ionophoric toxins for inter-bacterial competition.
Published 2024-11-01“…CdiA is presented on the inhibitor cell surface and delivers its toxic C-terminal region (CdiA-CT) into neighboring bacteria upon contact. …”
Get full text
Article -
90590
In vitro high-content screening reveals miR-429 as a protective molecule in photoreceptor degeneration
Published 2025-03-01Get full text
Article -
90591
«Non muovere né l’anima senza il corpo, né il corpo senza anima». Le pratiche del ritmo nel “Timeo” e nelle “Leggi” di Platone
Published 2024-12-01“…In the Timaeus, precisely because of its kinetic and rhythmic dimension, the practice of imitating the rhythms of the stars is conceived by Plato as the main cure for the “imbalances” that the soul encounters when incarnated in a mortal body. …”
Get full text
Article -
90592
Ethiopia hygiene practice during complementary feeding and associated factors; systematic review and meta-analysis
Published 2025-01-01“…Methods The systematic review methods were defined following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. …”
Get full text
Article -
90593
Autoregulation of the glial gene reversed polarity in Drosophila
Published 2025-01-01“…We provide further evidence that Repo protein acts as a transcription factor on its own regulatory DNA sequence. We report that three canonical Repo binding sites (RBSs) are located within the upstream 4.3 kilobase repo cis-regulatory DNA (CRD). …”
Get full text
Article -
90594
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
90595
Sistem Pakar : Deteksi Dini Stres pada Masa Pandemi Covid-19 Menggunakan Metode Forward Chaining
Published 2022-02-01“…Sedangkan para ahli psikologi mengatakan bahwa stres atau depresi dapat menurunkan sistem kekebalan tubuh yang merupakan pertahanan terakhir untuk mencegah virus Covid-19 menjangkiti tubuh seseorang. Maka itulah, peneliti bermaksud membuat sistem pakar yang sederhana menggunakan ilmu yang didapat dari seorang pakar, lalu dibuat daftar pertanyaan untuk mendeteksi apakah seseorang mengalami depresi/stres atau tidak, serta memberikan solusi atau saran bagi pengguna. …”
Get full text
Article -
90596
Pakistan’s Water Security Crisis: Challenges and the Case for Integrated Water Resource Management
Published 2025-01-01“…In the past, issues pertaining to water security were largely neglected, paving the way for its transformation into an existential threat with alarming consequences for Pakistan. …”
Get full text
Article -
90597
Long-Term Safety of PEGylated Coagulation Factor VIII in the Immune-Deficient Rowett Nude Rat
Published 2017-01-01“…Immunohistochemical staining examined the distribution of PEG in the brain. No adverse test item-related findings were seen and PEG was not detected in the brain. …”
Get full text
Article -
90598
Analysis of Circulating MicroRNAs In Vivo following Administration of Dexamethasone and Adrenocorticotropin
Published 2015-01-01“…Only circulating hsa-miR-27a proved to be significantly modulated in vivo by hormonal treatments: its expression was upregulated by dexamethasone whereas it was suppressed by adrenocorticotropin. …”
Get full text
Article -
90599
Associations between heavy metal exposure and vascular age: a large cross-sectional study
Published 2025-01-01“…Abstract Background Heavy metal exposure is an emerging environmental risk factor linked to cardiovascular disease (CVD) through its effects on vascular ageing. However, the relationship between heavy metal exposure and vascular age have not been fully elucidated. …”
Get full text
Article -
90600
Isolation of Mesophyll Protoplasts from Leaves of <i>Dalbergia sissoo</i> Roxb
Published 2013-07-01“…In case of die back, Dalbergia is facing the threat of destruction in its natural habitats due to lack of potential pathogenicity test which is the major bottleneck in pathogen assessment and tree improvement programmes. …”
Get full text
Article