Showing 125,141 - 125,160 results of 139,491 for search 'the*', query time: 0.64s Refine Results
  1. 125141

    Priority effects, nutrition and milk glycan-metabolic potential drive Bifidobacterium longum subspecies dynamics in the infant gut microbiome by Nicholas Pucci, Joanne Ujčič-Voortman, Arnoud P. Verhoeff, Daniel R. Mende

    Published 2025-01-01
    “…We further combined strain-tracking, meta-pangenomics and machine learning to understand these abundance dynamics and found an interplay of priority effects, milk-feeding type and HMG-utilization potential to govern them across the first six months of life. We find higher abundances of B. longum subsp. longum in the maternal gut microbiome, vertical transmission, breast milk and a broader range of HMG-utilizing genes to promote its abundance at one month of age. …”
    Get full text
    Article
  2. 125142
  3. 125143

    Implementation of malaria vector surveillance and insecticide resistance monitoring interventions in Nigeria by Abiodun Obembe, Adedayo O. Oduola, Adedapo Adeogun, Uwem Inyang, Tolulope Oyeniyi, Abiodun Olakiigbe, Ayodele Babalola, Petrus Inyama, Samdi Lazarus, Ifeanyi Okeke, Mary Esema, Okefu Oyale Okoko, Mamudu Omo-Eboh, Perpetua Uhomoibhi, Mohammed Bala, Samson Awolola

    Published 2024-12-01
    “…Collaborations and linkages between malaria control policy makers and existing research institutions generating vector surveillance research data are often weak, thereby hindering the availability of data for decision-making. …”
    Get full text
    Article
  4. 125144
  5. 125145

    Recent Progress about Flight Delay under Complex Network by Tang Zhixing, Huang Shan, Han Songchen

    Published 2021-01-01
    “…We surveyed recent progress about flight delay which makes extensive use of complex network theory in this paper. We scanned analyses on static network and temporal evolution, together with identification about topologically important nodes/edges. …”
    Get full text
    Article
  6. 125146
  7. 125147
  8. 125148

    Guiding the security protection of critical information infrastructure with scientific network security concept by Yangzhao LI, Changxiang SHEN, Nan TIAN

    Published 2019-09-01
    “…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
    Get full text
    Article
  9. 125149
  10. 125150

    Secure privacy-preserving record linkage system from re-identification attack. by Sejong Lee, Yushin Kim, Yongseok Kwon, Sunghyun Cho

    Published 2025-01-01
    “…These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks. …”
    Get full text
    Article
  11. 125151

    Quantum Radiation Properties of General Nonstationary Black Hole by T. Ibungochouba Singh

    Published 2017-01-01
    “…A new extra coupling effect is observed in the thermal radiation spectrum of Maxwell’s equations and Dirac equations which is absent in the thermal radiation spectrum of scalar particles. …”
    Get full text
    Article
  12. 125152

    Analysis of the Set, Meaning, Range and Frequency of Lodging the Reasons for Judicial Protection Request by Tine Jurič

    Published 2015-03-01
    “…The research established that the range of the challenging grounds for filing a request for judicial protection extends with the amendments to the Minor Offences Act and in this way provides a greater legal protection for offenders, and that most of them are filed due to a challenge on the grounds of erroneous and incomplete factual findings. …”
    Get full text
    Article
  13. 125153

    Use of Portable Air Purification Systems to Eliminate Aerosol Particles from Patient Rooms by Dominic Dellweg, Gerhard Scheuch, Thomas Voshaar, Dieter Köhler

    Published 2022-03-01
    “…We determined the efficacy of two different indoor air-purification systems and compared them to conventional measures of room ventilation. …”
    Get full text
    Article
  14. 125154

    Modern Approach to Ureteral Stones by Geert G. Tailly

    Published 2003-01-01
    “…Renal colic during pregnancy poses specific problems, both in imaging and therapy. Apart from the adequate treatment of renal colic, modern therapy of those ureteral calculi that will not pass spontaneously will consist of a judicious combination of ESWL (extracorporeal shock wave lithotripsy), endourology, and laparoscopy. …”
    Get full text
    Article
  15. 125155

    On Durrmeyer Type λ-Bernstein Operators via (p, q)-Calculus by Qing-Bo Cai, Guorong Zhou

    Published 2020-01-01
    “…In the present paper, Durrmeyer type λ-Bernstein operators via (p, q)-calculus are constructed, the first and second moments and central moments of these operators are estimated, a Korovkin type approximation theorem is established, and the estimates on the rate of convergence by using the modulus of continuity of second order and Steklov mean are studied, a convergence theorem for the Lipschitz continuous functions is also obtained. …”
    Get full text
    Article
  16. 125156

    Is Helicobacter pylori eradication required for non-steroidal anti-inflammatory drug-associated erosions and ulcers? by A. Ye. Karateyev, Ye. V. Moroz, Anastasia V. Tsurgan, N. V. Gontarenko

    Published 2018-08-01
    “…Available data allow to conclude that anti-H. pylori therapy requires differential approach in patients with indications for NSAID and LDA treatment. …”
    Get full text
    Article
  17. 125157

    Klein-Gordon Equations on Modulation Spaces by Guoping Zhao, Jiecheng Chen, Weichao Guo

    Published 2014-01-01
    “…We develop the well-posedness, blowup criterion, stability of regularity, scattering theory, and stability theory.…”
    Get full text
    Article
  18. 125158

    Programme de développement professionnel des fonctionnaires en vue de la création d’un environnement éducatif sûr dans le cadre de la loi martiale by Iryna Trubavina, Oleksandr Cherednychenko, Kirill Nedria, Nadiia Oliinyk

    Published 2024-09-01
    “…Research methods included analysis of theoretical sources, synthesis, modeling, oral interviews of educators, generalization of experience, and observation. …”
    Get full text
    Article
  19. 125159

    Cardiopulmonary Failure Requiring ECMO Bypass Resulting from Leukemia Cell Lysis in a Patient with Childhood Acute Myelomonocytic Leukemia by Michael Huang, Erin Owen, Scott Myers, Ashok Raj

    Published 2015-01-01
    “…Upon recovery, the patient went on to complete therapy and remains in remission without permanent neurologic or cardiac sequelae. …”
    Get full text
    Article
  20. 125160

    Key storage management scheme based on keyed hash tree with state by Xiangyu WANG, Jianfeng MA, Yinbin MIAO, Kai ZHANG, Qiying WU

    Published 2018-05-01
    “…To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and key derivation tree,and just needs to store the root key and the tree structure,which greatly reduces the key storage costs.In addition,the scheme manages key revocation according to the revocation state value,thereby solving the problem of key revocation and structure update.Strict security analysis shows that the partial data key disclosure does not leak the data confidentiality of remaining data,and the performance analysis using real-world dataset shows that the proposed key storage management scheme is acceptable in ciphertext retrieval system.…”
    Get full text
    Article