Suggested Topics within your search.
Suggested Topics within your search.
- Statistical methods 10
- Statistics 9
- Mathematical statistics 5
- Commercial statistics 4
- Geography 4
- Research 4
- statistics 4
- Biometry 3
- Economic conditions 3
- Social sciences 3
- Economic policy 2
- Economics 2
- Mathematics 2
- Medical statistics 2
- Methodology 2
- Multivariate analysis 2
- Probabilities 2
- Psychometrics 2
- Regression analysis 2
- Advertising media planning 1
- Afrika 1
- Anesthesia 1
- Automobiles 1
- Beauty operators 1
- Calculus 1
- Case studies 1
- Causes 1
- Celebrities 1
- Coming of Age 1
- Computer crimes 1
-
22201
CD16 and CD57 expressing gamma delta T cells in acute HIV-1 infection are associated with the development of neutralization breadth.
Published 2025-01-01“…We characterized early gamma-delta (γδ) T cell responses starting from pre-acquisition and during acute HIV infection (AHI) in participants previously characterized for neutralization breadth development. …”
Get full text
Article -
22202
Temporality of Movements of Northern Baikal Reindeer Herders, Hunters and Fishermen
Published 2012-12-01“…This type of movement implies the use of one main point where a movement starts and finishes. In contrast to short-term movements, long-term movements require intensive preparation, imply the use of several bases and cover larger distances. …”
Get full text
Article -
22203
A DFT Study on Selected Physical Organic Aspects of the Fischer Carbene Intermediates [(M(CO)4(C(OMe)Me)]
Published 2010-01-01“…Fischer carbenes are important starting materials for C-C bond formation via coupling reactions between carbene and wide variety of substituted alkenes or alkynes. …”
Get full text
Article -
22204
A Lie Theory-Based Control Scheme for a Solar-Fed Encoderless SPMSM
Published 2025-01-01“…The proposed control method has better dynamic performance, ease of start-up, and is simpler to implement compared to existing observer-based vector control methods. …”
Get full text
Article -
22205
Viralité et résistance aux discours de haine
Published 2024-12-01“…We then analyse more particularly some visuals, memes, a community semiotic form which allows to start from emotions to reflect on the stereotypes which underlie hate speech.…”
Get full text
Article -
22206
Hepatitis B Reactivation in a HBsAg-Negative, HBcAb-Positive Patient Receiving Fludarabine for the Treatment of Chronic Lymphocytic Leukaemia
Published 2011-01-01“…In haematology, the risk of reactivation of B hepatitis among HBsAg-positive patients has been documented; therefore, use of lamivudine prophylaxis is recommended before starting chemotherapy. Differently, for HBsAg-negative patients with markers of previous HBV infection (i.e., presence of isolated anti-HBc positivity) (anticore patients) management strategies are not univocal. …”
Get full text
Article -
22207
Transformation des structures agricoles et recomposition des paysages de bocage
Published 2015-07-01“…In the region of Basse-Normandie, the process of “agricultural modernisation” started in the 1950s has led to an unprecedented reorganisation of rural spaces and landscapes. …”
Get full text
Article -
22208
Advancing Therapeutic Targets in IBD: Emerging Goals and Precision Medicine Approaches
Published 2025-01-01“…This review aims to examine new potential therapeutic targets in IBD starting from the STRIDE-II statements. Key targets now include clinical remission, endoscopic remission, and biomarker normalization (such as C-reactive protein and fecal calprotectin). …”
Get full text
Article -
22209
A trusted IoT architecture model
Published 2017-10-01“…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
Get full text
Article -
22210
Dynamics of blood microsatellite instability (bMSI) burden predicts outcome of a patient treated with immune checkpoint inhibitors: a case report of hyperprogressive disease
Published 2025-02-01“…Sequential sampling of the patient’s plasma demonstrated an increase in MSI burden (bMSI), which was found to correlate with the increase of driver mutation burden one month after starting nivolumab, and hyperprogressive disease. Thus, analysis of bMSI in liquid biopsy via NGS may be a promising method for timely assessment of the treatment effectiveness received by patients with MSI-positive CRC.…”
Get full text
Article -
22211
Au rendez-vous allemand (2)
Published 2010-12-01“…Indeed, while Flaubert was starting Salammbô, he discovered the philological studies of the “New School” represented in France by Renan. …”
Get full text
Article -
22212
Characteristics of cultivation and development of technical grape varieties on the terraces of the Black Sea region of Odessa
Published 2025-01-01“…As a result of the conducted research and observations, it was established that, starting from the third year of full fruiting, excessive thickening of the crown of the bushes is observed, both as a result of powerful growth from wintering buds and as a result of the development of fattening shoots and side shoots, therefore, there is a need for pinching shoots in several stages. …”
Get full text
Article -
22213
Annealing Heat Treatment of ZnO Nanoparticles Grown on Porous Si Substrate Using Spin-Coating Method
Published 2014-01-01“…Zinc acetate dihydrate was used as a starting material in ZnO sol-gel solution preparation. …”
Get full text
Article -
22214
Zip and weak zip algebras in a congruence-modular variety
Published 2024-12-01“…Recently, Dube, Blose and Taherifar developed an abstract theory of zippedness by means of frames. Starting from some ideas contained in their papers, we define and study the zip and weak zip algebras in a semidegenerate congruence-modular variety $\mathcal{V}$. …”
Get full text
Article -
22215
Repair of mandrels of a continuous mill through the use of adapters
Published 2024-09-01“…The article describes the repair of mandrels used on a continuous type PQF mill by using adapters made from billets. The starting materials are the tailstocks that have been taken out of service.The process of repairing the mandrels allows the mandrel to be used in further work until the final regrinding to the last size range of the mandrel diameter.The technological process of repair begins with turning the surface of the mandrel to the required size, grinding the surface, the process of cutting off the rear part of the mandrel, including the threaded connection. …”
Get full text
Article -
22216
Mathematical mapping analysis method of multi-power system coupled with planetary gears
Published 2025-01-01“…ObjectiveIn order to quantitatively work out operating parameters and relation of parts of multi-power system coupled with planetary gears, a mathematical mapping analysis method was proposed.MethodsThe method was discussed by analyzing the hybrid system coupled with planetary gears of one truck, the kinematic and mechanical relations of parts of the system were deduced; a mathematical map was constructed with Matlab software; the switching order of modes and the path planning in start-up acceleration were quantitatively analyzed; the optimal cruising fuel consumption under different slopes and speeds was quantitatively analyzed; based on the above analysis, three system architecture optimizations were proposed, and compared to the original system in performance with simulation.ResultsThe switching order of modes, the path planning and the optimal fuel consumption point under cruising conditions could be intuitively and quantitatively figured out. …”
Get full text
Article -
22217
Contester par projets. Le cas des monnaies locales associatives
Published 2015-12-01“…This text analyses how the use of the category of project by the activists may generate a feedback on the very scope of contestation. The text, thus, starts with an analysis of the criticism or contestation that drives associative currencies initiatives. …”
Get full text
Article -
22218
Anti-Russian Sanctions in Global Economic Warfare
Published 2022-12-01“…The author puts forward a hypothesis according to which the real purpose of the anti-Russian sanctions imposed after the start of Russia's special military operation in Ukraine is not to change the foreign policy of the Russian Federation but to weaken the country as much as possible by causing economic damage to it and destabilizing the domestic political situation. …”
Get full text
Article -
22219
Gloss on the judgment of the Supreme Administrative Court in Warsaw of 22 August 2023, III FSK 354/23
Published 2023-12-01“…The ruling also provides a starting point for an analysis on the scattered control of constitutionality by the courts, which has been disputed in doctrine and jurisprudence for years. …”
Get full text
Article -
22220
Impact of IT Leadership on Transformation of the Role of IT in Improving Individual Tax Return Reporting Compliance at the Directorate General of Taxes
Published 2024-12-01“…It showed that the increase in the role of IT in an organization had to be following the strengthening of IT Leadership within an organization and support to driver started from the reformation and efficiency of IT within the organization.…”
Get full text
Article