Showing 9,521 - 9,540 results of 139,491 for search 'the*', query time: 0.30s Refine Results
  1. 9521

    Psoralidin: emerging biological activities of therapeutic benefits and its potential utility in cervical cancer by Tanya Tripathi, Apoorva Chaudhary, Divya Janjua, Udit Joshi, Nikita Aggarwal, Chetkar Chandra Keshavam, Alok Chandra Bharti

    Published 2024-09-01
    “…Its capacity to effectively target cancer stem cells (CSCs) in general adds to its therapeutic potential. Psoralidin carries out its anti-cancer activity by inducing oxidative stress, autophagy, and apoptosis. …”
    Get full text
    Article
  2. 9522

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  3. 9523
  4. 9524
  5. 9525
  6. 9526
  7. 9527

    THE PORTRAIT OF EDUCATIONAL PHILOSOPHY THROUGH AN ANALYSIS OF INDONESIAN MOVIE BASED ON PESANTREN THEME by Devi Nur Aini, Millatus Shofi, Latifatu Zuhriya

    Published 2022-05-01
    “…Film observation form gathered and the decoding process of it prior to the scene identification was based on education and specific themes. The results shown by the setting, gesture, and action of each character among the other, and some of the quotation based on some verses in Al-Qur’an to improve reliability. …”
    Get full text
    Article
  8. 9528
  9. 9529
  10. 9530
  11. 9531

    Anlotinib as Maintenance Therapy After First-Line Chemotherapy Combined with Consolidation Radiation for Extensive-Stage Small Cell Lung Cancer by Jinbo Ma MD, Xiaoyan Ma MS, Wei Zhang MD, Shanliang Hu MS, Rukun Zang MS, Xiaolong Wu MS, Jie Song MD

    Published 2025-01-01
    “…Conclusion Maintenance therapy with anlotinib improved the survival of patients with ES-SCLC after first-line chemotherapy and CTRT. …”
    Get full text
    Article
  12. 9532

    La biopolitique dans la théorie critique du tourisme : une critique radicale de la critique by Rodanthi Tzanelli

    Published 2022-08-01
    “…Après un bref exposé généalogique du concept en philosophie politique, il suit sa transposition et ses applications thématiques dans la théorie et la pratique du tourisme. …”
    Get full text
    Article
  13. 9533
  14. 9534
  15. 9535
  16. 9536

    Credit Index Screening Model of Family Farms and Family Ranches Based on Fuzzy Bayesian Theory of Depth Weighting by Zhanjiang Li, Qinjin Zhang

    Published 2022-01-01
    “…The construction of credit evaluation index system of Chinese family farm and pasture is not only a theoretical problem but also of great practical significance. …”
    Get full text
    Article
  17. 9537

    C.G. Bartholomew – H.A. Thomas, "The Minor Prophets. A Theological Introduction" (A Theological Introduction series; Downers Grove, IL: Inter-Varsity Press 2023) by Mariusz Szmajdziński

    Published 2025-01-01
    “…Thomas, "The Minor Prophets. A Theological Introduction" (A Theological Introduction series; Downers Grove, IL: Inter-Varsity Press 2023). …”
    Get full text
    Article
  18. 9538
  19. 9539

    Investigating the effect of parameters in the thermodynamic analysis of the solid oxide fuel cell cycle using response surface methodology by Hadi Ghaebi, Elahe Soleymani

    Published 2025-01-01
    “…According to the results of thermodynamic analysis, the net power output and exergy efficiency of solid oxide fuel cell are 2424 kW, 52.29% and 50.43%, respectively. …”
    Get full text
    Article
  20. 9540