Suggested Topics within your search.
Suggested Topics within your search.
- Law 10
- Methodology 7
- Reasoning 5
- methods 5
- Mass media 4
- Moral and ethical aspects 4
- Politics and government 4
- Anesthesia 3
- Economic conditions 3
- Economic development 3
- English language 3
- History 3
- Interpretation and construction 3
- Rhetoric 3
- Anatomy, Regional 2
- Anesthesia, Conduction 2
- College readers 2
- Common law 2
- Conduction anesthesia 2
- Grammar 2
- Information technology 2
- Internet in public administration 2
- Jurisprudence 2
- Management 2
- Objectivity 2
- Philosophy 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Regional planning 2
-
27121
False Alarm Causes and Wind Field Sensitivity Analysis of a Severe Rainfall Event in the Guangdong-Hong Kong-Macao Greater Bay Area Urban Cluster
Published 2024-01-01“…This study explores the reasons for false alarms and predictability using ground observation data, radar data, ECMWF-ERA5 reanalysis field data, and ECMWF and CMA-TRAMS forecast data. …”
Get full text
Article -
27122
Usefulness of a TDM-Guided Approach for Optimizing Teicoplanin Exposure in the Treatment of Secondary Bloodstream Infections Caused by Glycopeptide-Susceptible <i>Enterococcus faec...
Published 2025-01-01“…Targeted TDM-guided teicoplanin therapy, coupled with effective source control of the primary infection site by granting microbiological eradication in the vast majority of cases, may be considered a reasonable strategy for managing glycopeptide-susceptible <i>Enterococcus faecium</i> secondary BSIs.…”
Get full text
Article -
27123
Influence of Irradiance, Flow Rate, Reactor Geometry, and Photopromoter Concentration in Mineralization Kinetics of Methane in Air and in Aqueous Solutions by Photocatalytic Membra...
Published 2008-01-01“…The influence of irradiance on k1 and k2, as well as of flow rate on K1 and K2, is rationalized. The influence of reactor geometry on k values is discussed in view of standardization procedures of photocatalytic experiments. …”
Get full text
Article -
27124
Was Copernicus an Astrologer?
Published 2024-09-01“…In general, while the pro lines of reasoning are normally based upon insecure or even faulty inductive logic, their contra counterparts often suffer from ex silentio inferences or even ad ignorantiam fallacy. …”
Get full text
Article -
27125
Interspecific Competition Between <i>Eotetranychus sexmaculatus</i> Riley and <i>Oligonychus biharensis</i> Hirst (Acari: Tetranychidae)
Published 2025-01-01“…<i>Eotetranychus sexmaculatus</i> has long been recognized as an important spider mite pest of rubber trees. …”
Get full text
Article -
27126
Molecular assessment of NMDAR subunits and neuronal apoptosis in the trigeminal ganglion in a model of male migraine-induced rats following Moringa oleifera alcoholic extract admin...
Published 2025-02-01“…Moringa oleifera (M. oleifera), recognized for its anti-inflammatory properties and therapeutic potential in various conditions, has been investigated. …”
Get full text
Article -
27127
Computational model for mammalian circadian oscillator: interacting with NAD+/SIRT1 pathway and age-related changes in gene expression of circadian oscillator
Published 2017-02-01“…The results indicate that decrease in SIRT1 activity deal with agerelated NAD+ metabolic disorder may be one of the reasons for the circadian oscillator dysfunctions in the suprachiasmatic nuclei. …”
Get full text
Article -
27128
Dual Role of Bacteria in Carcinoma: Stimulation and Inhibition
Published 2020-01-01“…These changes come from several reasons, including smoking, drinking alcohol, sunlight, exposure to chemical or physical factors, and finally chronic infection with microorganisms, including bacteria. …”
Get full text
Article -
27129
Adequately Iodized Salt Utilization and Associated Factors among Households in Tach Armachio District, Northwest Ethiopia: A Community-Based Cross-Sectional Study
Published 2021-01-01“…Iodine deficiency disorder has been recognized as a serious public health issue in Ethiopia. …”
Get full text
Article -
27130
Germline Single-Nucleotide Polymorphism <i>GFI1-36N</i> Causes Alterations in Mitochondrial Metabolism and Leads to Increased ROS-Mediated DNA Damage in a Murine Model of Human Acu...
Published 2025-01-01“…However, the underlying reasons for the reduced DNA repair capacity in <i>GFI1-36N</i> leukemic cells are largely unknown. …”
Get full text
Article -
27131
Community-based participatory process evaluation based on the Reach, Quality Control, Fidelity, Satisfaction, and Management (RQFSM) model in Nevada: A study protocol
Published 2024-12-01“…This integration will be particularly crucial in places where access to reasonably priced healthcare is hampered by cultural, geographic, or economic restrictions. …”
Get full text
Article -
27132
Effect of Exogenous of Transforming Growth Factor-β1 on Pregnancy Outcome in Mice with Recurrent Pregnancy Loss by Persistent Enhancement of Placental Tissue Indoleamine 2,3-Dioxyg...
Published 2025-01-01“…Background: The immunologic factors are the chief reason for recurrent pregnancy loss (RPL) and induction ofmaternal-fetal tolerance is the main treatment for this cause of RPL, but the effect of this method is uncertainly andneeds multiple doses and/or interventions. …”
Get full text
Article -
27133
Computer simulation of the spatial structure of MUC 1 peptides capable of inhibiting apoptosis
Published 2016-01-01“…It complicates significantly the rational design of potential drugs on the basis of these peptides. …”
Get full text
Article -
27134
Dynamic Balance is Similar Between Lower Extremities in Elite Fencers
Published 2021-12-01“…Generally, asymmetry in dynamic balance performance between the left and right legs can be an indicator of lower extremity injury risk and used to monitor rehabilitation progress. Fencing is recognized as an asymmetric sport, therefore, differences in dynamic balance may exist among uninjured athletes…”
Get full text
Article -
27135
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
27136
Squamanitaceae and three new species of Squamanita parasitic on Amanita basidiomes
Published 2021-03-01“…Recently they were recognized as Squamanitaceae, but previous studies used few DNA markers from a restricted sample of taxa from the family and lacked a formal taxonomic treatment. …”
Get full text
Article -
27137
Cultural dimensions of safe cities
Published 2024-01-01“…Although Hofstede's theory also has limitations, there are undoubtedly many reasons for studying urban safety through the prism of cultural values, considering the potential of Hofstede's model and the theoretical implications that can be reached.…”
Get full text
Article -
27138
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…Furthermore, the Gaussian kernel function recognizes authorized or unauthorized users for secure cloud information transmission. …”
Get full text
Article -
27139
Galileo multi-day precise orbit determination using L-band and SLR data
Published 2025-01-01“…The continuously available satellites of European Galileo currently reach more than 25. To explore the rationality and reliability of the L-band and satellite laser ranging (SLR) data processing strategies, we design the Galileo L-band, the SLR-only, and the combined L-band/SLR dynamic precise orbit determination (POD) strategies by using the normal equations (NEQs) stacking, and investigate their continuity and stability by employing the Galileo L-band data and SLR observations for the time span of the whole year of 2023, based on the BeiDou/GNSS analysis center platform of Shandong University by using the modified Bernese GNSS Software Version 5.4. …”
Get full text
Article -
27140
Identification of progressive pulmonary fibrosis: consensus findings from a modified Delphi study
Published 2024-12-01“…Consensus was reached that a histological pattern of usual interstitial pneumonia (UIP) is a risk factor for progression of ILD, but that a biopsy to look for a UIP pattern should not be performed solely for prognostic reasons. Consensus was not reached on the time period over which progression should be defined. …”
Get full text
Article