Showing 27,121 - 27,140 results of 28,777 for search 'retcon~', query time: 2.79s Refine Results
  1. 27121

    False Alarm Causes and Wind Field Sensitivity Analysis of a Severe Rainfall Event in the Guangdong-Hong Kong-Macao Greater Bay Area Urban Cluster by Lan Zhang, Jiawen Zheng, Huaiyu Li, Rui Yu, Lei Wei, Yufei Zhang

    Published 2024-01-01
    “…This study explores the reasons for false alarms and predictability using ground observation data, radar data, ECMWF-ERA5 reanalysis field data, and ECMWF and CMA-TRAMS forecast data. …”
    Get full text
    Article
  2. 27122

    Usefulness of a TDM-Guided Approach for Optimizing Teicoplanin Exposure in the Treatment of Secondary Bloodstream Infections Caused by Glycopeptide-Susceptible <i>Enterococcus faec... by Milo Gatti, Matteo Rinaldi, Maddalena Giannella, Pierluigi Viale, Federico Pea

    Published 2025-01-01
    “…Targeted TDM-guided teicoplanin therapy, coupled with effective source control of the primary infection site by granting microbiological eradication in the vast majority of cases, may be considered a reasonable strategy for managing glycopeptide-susceptible <i>Enterococcus faecium</i> secondary BSIs.…”
    Get full text
    Article
  3. 27123

    Influence of Irradiance, Flow Rate, Reactor Geometry, and Photopromoter Concentration in Mineralization Kinetics of Methane in Air and in Aqueous Solutions by Photocatalytic Membra... by Ignazio Renato Bellobono, Mauro Rossi, Andrea Testino, Franca Morazzoni, Riccardo Bianchi, Giulia de Martini, Paola Maria Tozzi, Rodica Stanescu, Cristina Costache, Liliana Bobirica, Mauro Luigi Bonardi, Flavia Groppi

    Published 2008-01-01
    “…The influence of irradiance on k1 and k2, as well as of flow rate on K1 and K2, is rationalized. The influence of reactor geometry on k values is discussed in view of standardization procedures of photocatalytic experiments. …”
    Get full text
    Article
  4. 27124

    Was Copernicus an Astrologer? by George Borski, Ivan Kolkov

    Published 2024-09-01
    “…In general, while the pro lines of reasoning are normally based upon insecure or even faulty inductive logic, their contra counterparts often suffer from ex silentio inferences or even ad ignorantiam fallacy. …”
    Get full text
    Article
  5. 27125

    Interspecific Competition Between <i>Eotetranychus sexmaculatus</i> Riley and <i>Oligonychus biharensis</i> Hirst (Acari: Tetranychidae) by Lijiu Zheng, Yong Zhang, Xia Shi, Wei Gan, Fangping Zhang, Yueguan Fu, Ya Liu, Junyu Chen, Zhengpei Ye

    Published 2025-01-01
    “…<i>Eotetranychus sexmaculatus</i> has long been recognized as an important spider mite pest of rubber trees. …”
    Get full text
    Article
  6. 27126

    Molecular assessment of NMDAR subunits and neuronal apoptosis in the trigeminal ganglion in a model of male migraine-induced rats following Moringa oleifera alcoholic extract admin... by Ahmad Vafaeian, Ali Vafaei, Mohammad Reza Parvizi, Mohsen Chamanara, Mojgan Mehriardestani, Yasaman Hosseini

    Published 2025-02-01
    “…Moringa oleifera (M. oleifera), recognized for its anti-inflammatory properties and therapeutic potential in various conditions, has been investigated. …”
    Get full text
    Article
  7. 27127

    Computational model for mammalian circadian oscillator: interacting with NAD+/SIRT1 pathway and age-related changes in gene expression of circadian oscillator by N. L. Podkolodnyy, N. N. Tverdokhleb, O. A. Podkolodnaya

    Published 2017-02-01
    “…The results indicate that decrease in SIRT1 activity deal with agerelated NAD+ metabolic disorder may be one of the reasons for the circadian oscillator dysfunctions in the suprachiasmatic nuclei. …”
    Get full text
    Article
  8. 27128

    Dual Role of Bacteria in Carcinoma: Stimulation and Inhibition by Suad A Al-Hilu, Wisam H Al-Shujairi

    Published 2020-01-01
    “…These changes come from several reasons, including smoking, drinking alcohol, sunlight, exposure to chemical or physical factors, and finally chronic infection with microorganisms, including bacteria. …”
    Get full text
    Article
  9. 27129
  10. 27130
  11. 27131

    Community-based participatory process evaluation based on the Reach, Quality Control, Fidelity, Satisfaction, and Management (RQFSM) model in Nevada: A study protocol by Asma Awan, Manoj Sharma

    Published 2024-12-01
    “…This integration will be particularly crucial in places where access to reasonably priced healthcare is hampered by cultural, geographic, or economic restrictions. …”
    Get full text
    Article
  12. 27132

    Effect of Exogenous of Transforming Growth Factor-β1 on Pregnancy Outcome in Mice with Recurrent Pregnancy Loss by Persistent Enhancement of Placental Tissue Indoleamine 2,3-Dioxyg... by Xinghui Wen, Xiaojuan Chen, Mei Li, Jinnian Zhou, Shouli Dao, Shixiang Li, Hui Cheng, Shuyun Zhao, Guanyou Huang

    Published 2025-01-01
    “…Background: The immunologic factors are the chief reason for recurrent pregnancy loss (RPL) and induction ofmaternal-fetal tolerance is the main treatment for this cause of RPL, but the effect of this method is uncertainly andneeds multiple doses and/or interventions. …”
    Get full text
    Article
  13. 27133

    Computer simulation of the spatial structure of MUC 1 peptides capable of inhibiting apoptosis by N. V. Ivanisenko, I. N. Lavrik, V. A. Ivanisenko

    Published 2016-01-01
    “…It complicates significantly the rational design of potential drugs on the basis of these peptides. …”
    Get full text
    Article
  14. 27134

    Dynamic Balance is Similar Between Lower Extremities in Elite Fencers by Nader Abdelkader, Stephen H.M. Brown, Tyson A.C. Beach, Samuel J. Howarth

    Published 2021-12-01
    “…Generally, asymmetry in dynamic balance performance between the left and right legs can be an indicator of lower extremity injury risk and used to monitor rehabilitation progress. Fencing is recognized as an asymmetric sport, therefore, differences in dynamic balance may exist among uninjured athletes…”
    Get full text
    Article
  15. 27135

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  16. 27136

    Squamanitaceae and three new species of Squamanita parasitic on Amanita basidiomes by Jian-Wei Liu, Zai-Wei Ge, Egon Horak, Alfredo Vizzini, Roy E. Halling, Chun-Lei Pan, Zhu L. Yang

    Published 2021-03-01
    “…Recently they were recognized as Squamanitaceae, but previous studies used few DNA markers from a restricted sample of taxa from the family and lacked a formal taxonomic treatment. …”
    Get full text
    Article
  17. 27137

    Cultural dimensions of safe cities by Ćurčić Slađana

    Published 2024-01-01
    “…Although Hofstede's theory also has limitations, there are undoubtedly many reasons for studying urban safety through the prism of cultural values, considering the potential of Hofstede's model and the theoretical implications that can be reached.…”
    Get full text
    Article
  18. 27138

    Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services by Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, Badria Sulaiman Alfurhood, Anitha Premkumar

    Published 2024-01-01
    “…Furthermore, the Gaussian kernel function recognizes authorized or unauthorized users for secure cloud information transmission. …”
    Get full text
    Article
  19. 27139

    Galileo multi-day precise orbit determination using L-band and SLR data by Tianhe Xu, Honglei Yang, Song Li, Zhenlong Fang, Wenfeng Nie, Min Li, Baoguo Yu

    Published 2025-01-01
    “…The continuously available satellites of European Galileo currently reach more than 25. To explore the rationality and reliability of the L-band and satellite laser ranging (SLR) data processing strategies, we design the Galileo L-band, the SLR-only, and the combined L-band/SLR dynamic precise orbit determination (POD) strategies by using the normal equations (NEQs) stacking, and investigate their continuity and stability by employing the Galileo L-band data and SLR observations for the time span of the whole year of 2023, based on the BeiDou/GNSS analysis center platform of Shandong University by using the modified Bernese GNSS Software Version 5.4. …”
    Get full text
    Article
  20. 27140

    Identification of progressive pulmonary fibrosis: consensus findings from a modified Delphi study by Athol U. Wells, Simon L. F. Walsh, Ayodeji Adegunsoye, Vincent Cottin, Sonye K. Danoff, Anand Devaraj, Kevin R. Flaherty, Peter M. George, Kerri A. Johannson, Martin Kolb, Yasuhiro Kondoh, Andrew G. Nicholson, Sara Tomassetti, Elizabeth R. Volkmann, Kevin K. Brown

    Published 2024-12-01
    “…Consensus was reached that a histological pattern of usual interstitial pneumonia (UIP) is a risk factor for progression of ILD, but that a biopsy to look for a UIP pattern should not be performed solely for prognostic reasons. Consensus was not reached on the time period over which progression should be defined. …”
    Get full text
    Article