Showing 91,281 - 91,300 results of 139,491 for search 'the*', query time: 0.55s Refine Results
  1. 91281

    Gene Array Studies in Renal Neoplasia by John P.T. Higgins

    Published 2006-01-01
    “…Yet renal cell carcinoma is often discovered at an advanced clinical stage and effective pharmacologic therapies for this disease remain to be discovered. …”
    Get full text
    Article
  2. 91282

    A Book Review of Graphic for Learning Proven Guidelines for Planning, Designing, and Evaluating Visuals in Traning Materials by Sakineh Talebi, Mohammad Reza Nili Ahmadabadi

    Published 2020-12-01
    “…The authors’ efforts in presenting the material are accompanied by features such as the use of research evidence and action-based cognitive theory in real-life learning situations, clear and integrated expression, and up-to-datedness, to distinguish this book from other books in graphic design. …”
    Get full text
    Article
  3. 91283
  4. 91284

    Gastroscopy in Pediatric Surgery: Indications, Complications, Outcomes, and Ethical Aspects by Louise Roth, Martin Salö, Mette Hambraeus, Pernilla Stenström, Einar Arnbjörnsson

    Published 2015-01-01
    “…The indications for gastroscopies changed over time. Therefore, 376 gastroscopies performed from 2011 through 2014 were studied separately. …”
    Get full text
    Article
  5. 91285

    Tourism and the Accumulation of Capital: A Perspective on the Reserve of the Biosfera Sian Ka’an by Alejandra Rojas Correa, Alejandro Palafox-Muñoz

    Published 2019-05-01
    “…This process is studied drawing from a theoretical proposal of three dynamics of accumulation of capital in protected natural areas: penetration, subsumption, and enclosure.…”
    Get full text
    Article
  6. 91286

    La dignità umana e la ricerca del suo fondamento. Considerazioni a margine dall’Enciclica “Fratelli tutti” by Agnese Varsalona

    Published 2022-10-01
    “…Such a search cannot prescind from the concept of person, taken up in the theological reflection of the first centuries to say the newness of the God of Jesus, and only later used to tell who is the human being, whose creation in the image and likeness of God grounds his inalienable dignity. …”
    Get full text
    Article
  7. 91287
  8. 91288

    Research on the application of 700 MHz frequency band in 5G network optimization by Yejiang ZHANG, Lei SUN, Yiyan YIN, Xiaokang YANG, Jian HU

    Published 2022-06-01
    “…The 700 MHz frequency band has the advantages of low frequency, strong diffraction ability, and good coverage effect.China Mobile and China Radio and Television had made it clear that they would jointly build and share 5G networks based on 700 MHz frequency band resources.Firstly, the coverage advantages of 700 MHz frequency band were analyzed theoretically, and then the pilot projects such as 700 MHz 5G station continuous road coverage test, residential building coverage performance test and fixed-point capacity performance test provided data support for the subsequent 700 MHz 5G network construction and optimization.It could release the value of 700 MHz gold spectrum to the greatest extent and continuously improve the quality of 5G wireless network from the aspects of actively avoiding 700 MHz radio and television frequency interference, giving full play to the advantages of high and low frequency networking schemes, and actively exploring multi band collaborative optimization strategies.…”
    Get full text
    Article
  9. 91289
  10. 91290

    ANALYSIS ON THE FATIGUE FRACTURE CHARACTERISTICS OF COMPOSITE INSULATOR CORE ROD by ZHAO XinZe, XI SenMing, WANG Lei, PENG WenYu, ZHAO MeiYun

    Published 2018-01-01
    “…The fractal geometry theory was used to describe the complexity of the fracture morphology in quantitatively and discussed the relationship between the fractal dimension and the fatigue loads. …”
    Get full text
    Article
  11. 91291
  12. 91292

    Susceptibility of different mice species to chemical induction of colorectal cancer by 1,2-dimethylhydrazine by Nourhan M. Abdelmaksoud, Ahmed I. Abulsoud, Tamer M. Abdelghany, Shereen Saeid Elshaer, Ahmed Samaha, Nadine W. Maurice, Sherine Maher Rizk, Mahmoud A. Senousy

    Published 2025-01-01
    “…Conclusion In conclusion, C57BL/6 has a higher susceptibility toward chemical induction to CRC; therefore, it can be used to study CRC pathogenesis, prevention, and treatment.…”
    Get full text
    Article
  13. 91293

    Scientometric Analysis of Human Error Research and Human Reliability in Industries (1980-2022) by Hamed Yarmohammadi, Mehdi Jahangiri, Moslem Ali Mohammadloo, Mojtaba Kamalinia

    Published 2025-01-01
    “…Only a tiny percentage of studies address the prevention of human errors. Therefore, greater attention needs to be paid to prevention and protective measures.…”
    Get full text
    Article
  14. 91294

    Design of miner type identification mechanism based on reputation management model by Jiaren YU, Youliang TIAN, Hui LIN

    Published 2022-02-01
    “…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
    Get full text
    Article
  15. 91295

    Construction of a pathogenic microorganism detection method based on third-generation nanopore sequencing data by Guoqin Mai, Jiayi Chen, Min Zhang, Wanyue Zhang, Yuting Luo, Ying Dai

    Published 2025-02-01
    “…Abstract Background Pathogenic microorganisms can cause infections, allergies, diarrhoea, tumours, other diseases, and even death. Therefore, the detection of pathogenic microorganisms is important. …”
    Get full text
    Article
  16. 91296

    Les funérailles charognardes. Homicide, cannibalisme et sacrifice humain pour les Yurakaré (Amazonie bolivienne) by Vincent Hirtzel

    Published 2013-12-01
    “…This study reveals a transformation of the Amazonian cannibalism which is also a Foothill critique of this kind of human sacrifice and is intended to contribute to a general theory of war, cannibalism and sacrifice in South America, beyond the academic frontier dividing highlands and lowlands.…”
    Get full text
    Article
  17. 91297

    Survey of digital signature technology based on error correcting codes by Fang REN, Dong ZHENG, Jiu-lun FAN

    Published 2016-11-01
    “…The emergence of quantum algorithms have threatened the security of digital signature algorithms widely used currently,most of which based on some hard problems in number theory.The digital signature algorithms based on error correcting codes,which can resist quantum attack,has been studied by many researchers in recent years and there have been many research results in different areas,such as normal digital signature,blind signature,ring signature,group signature.Because of the fast computation speed and high security,it has become one of the most promising digital signature technologies.A comprehensive introduction was given and digital signature technologies based on error correcting codes were summarized,the key technologies were analyzed and the possible research directions in the future were pointed out.…”
    Get full text
    Article
  18. 91298

    Elasticity Solutions for Sandwich Arches considering Permeation Effect of Adhesive by Ruili Huo, Yichen Liu, Peng Wu, Hai Fang, Weiqing Liu, Ding Zhou

    Published 2020-01-01
    “…The one-dimensional (1D) solution based on the Euler–Bernoulli theory is close to the present one; however, the error increases as the arch becomes thick. …”
    Get full text
    Article
  19. 91299
  20. 91300

    Density by Moduli and Statistical Boundedness by Vinod K. Bhardwaj, Shweta Dhawan, Sandeep Gupta

    Published 2016-01-01
    “…It is shown that bounded sequences are precisely those sequences which are f-statistically bounded for every unbounded modulus f. A decomposition theorem for f-statistical convergence for vector valued sequences and a structure theorem for f-statistical boundedness have also been established.…”
    Get full text
    Article