Suggested Topics within your search.
Suggested Topics within your search.
- History 15
- methods 13
- Philosophy 12
- therapy 12
- Moral and ethical aspects 10
- Research 9
- Study and teaching 9
- Economic development 7
- History and criticism 7
- Mass media 7
- Social service 7
- Management 6
- Psychology 6
- Thermodynamics 6
- Economic policy 5
- English language 5
- Information technology 5
- Pharmacology 5
- Social aspects 5
- diagnosis 5
- Anesthesia 4
- Drug Therapy 4
- Economic conditions 4
- Education 4
- Law 4
- Literature 4
- Marketing 4
- Methodology 4
- Problems, exercises, etc 4
- Public administration 4
-
125141
Priority effects, nutrition and milk glycan-metabolic potential drive Bifidobacterium longum subspecies dynamics in the infant gut microbiome
Published 2025-01-01“…We further combined strain-tracking, meta-pangenomics and machine learning to understand these abundance dynamics and found an interplay of priority effects, milk-feeding type and HMG-utilization potential to govern them across the first six months of life. We find higher abundances of B. longum subsp. longum in the maternal gut microbiome, vertical transmission, breast milk and a broader range of HMG-utilizing genes to promote its abundance at one month of age. …”
Get full text
Article -
125142
-
125143
Implementation of malaria vector surveillance and insecticide resistance monitoring interventions in Nigeria
Published 2024-12-01“…Collaborations and linkages between malaria control policy makers and existing research institutions generating vector surveillance research data are often weak, thereby hindering the availability of data for decision-making. …”
Get full text
Article -
125144
The influence learning used ABC run exercise on the sprint capabilities
Published 2020-06-01Get full text
Article -
125145
Recent Progress about Flight Delay under Complex Network
Published 2021-01-01“…We surveyed recent progress about flight delay which makes extensive use of complex network theory in this paper. We scanned analyses on static network and temporal evolution, together with identification about topologically important nodes/edges. …”
Get full text
Article -
125146
-
125147
-
125148
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01“…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
Get full text
Article -
125149
-
125150
Secure privacy-preserving record linkage system from re-identification attack.
Published 2025-01-01“…These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks. …”
Get full text
Article -
125151
Quantum Radiation Properties of General Nonstationary Black Hole
Published 2017-01-01“…A new extra coupling effect is observed in the thermal radiation spectrum of Maxwell’s equations and Dirac equations which is absent in the thermal radiation spectrum of scalar particles. …”
Get full text
Article -
125152
Analysis of the Set, Meaning, Range and Frequency of Lodging the Reasons for Judicial Protection Request
Published 2015-03-01“…The research established that the range of the challenging grounds for filing a request for judicial protection extends with the amendments to the Minor Offences Act and in this way provides a greater legal protection for offenders, and that most of them are filed due to a challenge on the grounds of erroneous and incomplete factual findings. …”
Get full text
Article -
125153
Use of Portable Air Purification Systems to Eliminate Aerosol Particles from Patient Rooms
Published 2022-03-01“…We determined the efficacy of two different indoor air-purification systems and compared them to conventional measures of room ventilation. …”
Get full text
Article -
125154
Modern Approach to Ureteral Stones
Published 2003-01-01“…Renal colic during pregnancy poses specific problems, both in imaging and therapy. Apart from the adequate treatment of renal colic, modern therapy of those ureteral calculi that will not pass spontaneously will consist of a judicious combination of ESWL (extracorporeal shock wave lithotripsy), endourology, and laparoscopy. …”
Get full text
Article -
125155
On Durrmeyer Type λ-Bernstein Operators via (p, q)-Calculus
Published 2020-01-01“…In the present paper, Durrmeyer type λ-Bernstein operators via (p, q)-calculus are constructed, the first and second moments and central moments of these operators are estimated, a Korovkin type approximation theorem is established, and the estimates on the rate of convergence by using the modulus of continuity of second order and Steklov mean are studied, a convergence theorem for the Lipschitz continuous functions is also obtained. …”
Get full text
Article -
125156
Is Helicobacter pylori eradication required for non-steroidal anti-inflammatory drug-associated erosions and ulcers?
Published 2018-08-01“…Available data allow to conclude that anti-H. pylori therapy requires differential approach in patients with indications for NSAID and LDA treatment. …”
Get full text
Article -
125157
Klein-Gordon Equations on Modulation Spaces
Published 2014-01-01“…We develop the well-posedness, blowup criterion, stability of regularity, scattering theory, and stability theory.…”
Get full text
Article -
125158
Programme de développement professionnel des fonctionnaires en vue de la création d’un environnement éducatif sûr dans le cadre de la loi martiale
Published 2024-09-01“…Research methods included analysis of theoretical sources, synthesis, modeling, oral interviews of educators, generalization of experience, and observation. …”
Get full text
Article -
125159
Cardiopulmonary Failure Requiring ECMO Bypass Resulting from Leukemia Cell Lysis in a Patient with Childhood Acute Myelomonocytic Leukemia
Published 2015-01-01“…Upon recovery, the patient went on to complete therapy and remains in remission without permanent neurologic or cardiac sequelae. …”
Get full text
Article -
125160
Key storage management scheme based on keyed hash tree with state
Published 2018-05-01“…To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and key derivation tree,and just needs to store the root key and the tree structure,which greatly reduces the key storage costs.In addition,the scheme manages key revocation according to the revocation state value,thereby solving the problem of key revocation and structure update.Strict security analysis shows that the partial data key disclosure does not leak the data confidentiality of remaining data,and the performance analysis using real-world dataset shows that the proposed key storage management scheme is acceptable in ciphertext retrieval system.…”
Get full text
Article