Suggested Topics within your search.
Suggested Topics within your search.
- History 15
- methods 13
- Philosophy 12
- therapy 12
- Moral and ethical aspects 10
- Research 9
- Study and teaching 9
- Economic development 7
- History and criticism 7
- Mass media 7
- Social service 7
- Management 6
- Psychology 6
- Thermodynamics 6
- Economic policy 5
- English language 5
- Information technology 5
- Pharmacology 5
- Social aspects 5
- diagnosis 5
- Anesthesia 4
- Drug Therapy 4
- Economic conditions 4
- Education 4
- Law 4
- Literature 4
- Marketing 4
- Methodology 4
- Problems, exercises, etc 4
- Public administration 4
-
91281
Gene Array Studies in Renal Neoplasia
Published 2006-01-01“…Yet renal cell carcinoma is often discovered at an advanced clinical stage and effective pharmacologic therapies for this disease remain to be discovered. …”
Get full text
Article -
91282
A Book Review of Graphic for Learning Proven Guidelines for Planning, Designing, and Evaluating Visuals in Traning Materials
Published 2020-12-01“…The authors’ efforts in presenting the material are accompanied by features such as the use of research evidence and action-based cognitive theory in real-life learning situations, clear and integrated expression, and up-to-datedness, to distinguish this book from other books in graphic design. …”
Get full text
Article -
91283
-
91284
Gastroscopy in Pediatric Surgery: Indications, Complications, Outcomes, and Ethical Aspects
Published 2015-01-01“…The indications for gastroscopies changed over time. Therefore, 376 gastroscopies performed from 2011 through 2014 were studied separately. …”
Get full text
Article -
91285
Tourism and the Accumulation of Capital: A Perspective on the Reserve of the Biosfera Sian Ka’an
Published 2019-05-01“…This process is studied drawing from a theoretical proposal of three dynamics of accumulation of capital in protected natural areas: penetration, subsumption, and enclosure.…”
Get full text
Article -
91286
La dignità umana e la ricerca del suo fondamento. Considerazioni a margine dall’Enciclica “Fratelli tutti”
Published 2022-10-01“…Such a search cannot prescind from the concept of person, taken up in the theological reflection of the first centuries to say the newness of the God of Jesus, and only later used to tell who is the human being, whose creation in the image and likeness of God grounds his inalienable dignity. …”
Get full text
Article -
91287
NEW PROFILE MODIFICATION METHOD OF NON⁃UNIFORM MESHES BASED ON SHAPE FUNCTION
Published 2024-08-01Get full text
Article -
91288
Research on the application of 700 MHz frequency band in 5G network optimization
Published 2022-06-01“…The 700 MHz frequency band has the advantages of low frequency, strong diffraction ability, and good coverage effect.China Mobile and China Radio and Television had made it clear that they would jointly build and share 5G networks based on 700 MHz frequency band resources.Firstly, the coverage advantages of 700 MHz frequency band were analyzed theoretically, and then the pilot projects such as 700 MHz 5G station continuous road coverage test, residential building coverage performance test and fixed-point capacity performance test provided data support for the subsequent 700 MHz 5G network construction and optimization.It could release the value of 700 MHz gold spectrum to the greatest extent and continuously improve the quality of 5G wireless network from the aspects of actively avoiding 700 MHz radio and television frequency interference, giving full play to the advantages of high and low frequency networking schemes, and actively exploring multi band collaborative optimization strategies.…”
Get full text
Article -
91289
Pancreatic resection with perioperative drug repurposing of propranolol and etodolac: trial protocol of the phase-II randomised placebo controlled PROSPER trial
Published 2020-09-01“…Despite advances in systemic chemotherapy, the mainstay of curative therapy for non-metastatic disease is surgical resection. …”
Get full text
Article -
91290
ANALYSIS ON THE FATIGUE FRACTURE CHARACTERISTICS OF COMPOSITE INSULATOR CORE ROD
Published 2018-01-01“…The fractal geometry theory was used to describe the complexity of the fracture morphology in quantitatively and discussed the relationship between the fractal dimension and the fatigue loads. …”
Get full text
Article -
91291
-
91292
Susceptibility of different mice species to chemical induction of colorectal cancer by 1,2-dimethylhydrazine
Published 2025-01-01“…Conclusion In conclusion, C57BL/6 has a higher susceptibility toward chemical induction to CRC; therefore, it can be used to study CRC pathogenesis, prevention, and treatment.…”
Get full text
Article -
91293
Scientometric Analysis of Human Error Research and Human Reliability in Industries (1980-2022)
Published 2025-01-01“…Only a tiny percentage of studies address the prevention of human errors. Therefore, greater attention needs to be paid to prevention and protective measures.…”
Get full text
Article -
91294
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article -
91295
Construction of a pathogenic microorganism detection method based on third-generation nanopore sequencing data
Published 2025-02-01“…Abstract Background Pathogenic microorganisms can cause infections, allergies, diarrhoea, tumours, other diseases, and even death. Therefore, the detection of pathogenic microorganisms is important. …”
Get full text
Article -
91296
Les funérailles charognardes. Homicide, cannibalisme et sacrifice humain pour les Yurakaré (Amazonie bolivienne)
Published 2013-12-01“…This study reveals a transformation of the Amazonian cannibalism which is also a Foothill critique of this kind of human sacrifice and is intended to contribute to a general theory of war, cannibalism and sacrifice in South America, beyond the academic frontier dividing highlands and lowlands.…”
Get full text
Article -
91297
Survey of digital signature technology based on error correcting codes
Published 2016-11-01“…The emergence of quantum algorithms have threatened the security of digital signature algorithms widely used currently,most of which based on some hard problems in number theory.The digital signature algorithms based on error correcting codes,which can resist quantum attack,has been studied by many researchers in recent years and there have been many research results in different areas,such as normal digital signature,blind signature,ring signature,group signature.Because of the fast computation speed and high security,it has become one of the most promising digital signature technologies.A comprehensive introduction was given and digital signature technologies based on error correcting codes were summarized,the key technologies were analyzed and the possible research directions in the future were pointed out.…”
Get full text
Article -
91298
Elasticity Solutions for Sandwich Arches considering Permeation Effect of Adhesive
Published 2020-01-01“…The one-dimensional (1D) solution based on the Euler–Bernoulli theory is close to the present one; however, the error increases as the arch becomes thick. …”
Get full text
Article -
91299
Research of ECMS Energy Management Strategy of Hybrid System based on Grey Forecasting
Published 2017-01-01Get full text
Article -
91300
Density by Moduli and Statistical Boundedness
Published 2016-01-01“…It is shown that bounded sequences are precisely those sequences which are f-statistically bounded for every unbounded modulus f. A decomposition theorem for f-statistical convergence for vector valued sequences and a structure theorem for f-statistical boundedness have also been established.…”
Get full text
Article