Suggested Topics within your search.
Suggested Topics within your search.
- History 15
- methods 13
- Philosophy 12
- therapy 12
- Moral and ethical aspects 10
- Research 9
- Study and teaching 9
- Economic development 7
- History and criticism 7
- Mass media 7
- Social service 7
- Management 6
- Psychology 6
- Thermodynamics 6
- Economic policy 5
- English language 5
- Information technology 5
- Pharmacology 5
- Social aspects 5
- diagnosis 5
- Anesthesia 4
- Drug Therapy 4
- Economic conditions 4
- Education 4
- Law 4
- Literature 4
- Marketing 4
- Methodology 4
- Problems, exercises, etc 4
- Public administration 4
-
125501
Paradox of Modern Pregnancy: A Phenomenological Study of Women’s Lived Experiences from Assisted Pregnancy
Published 2015-01-01“…Semistructured in-depth interviews were conducted with 12 women who experienced assisted pregnancy. Three themes emerged from women’s experience including finding peace in life, paradoxical feelings, and struggling to realize a dream. …”
Get full text
Article -
125502
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01“…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
Get full text
Article -
125503
Contrastive-learning of language embedding and biological features for cross modality encoding and effector prediction
Published 2025-02-01“…Abstract Identifying and characterizing virulence proteins secreted by Gram-negative bacteria are fundamental for deciphering microbial pathogenicity as well as aiding the development of therapeutic strategies. Effector predictors utilizing pre-trained protein language models (PLMs) have shown sound performance by leveraging extensive evolutionary and sequential protein features. …”
Get full text
Article -
125504
From a dictionary to an atlas: segmental mapping of the linguistic picture of the world
Published 2014-02-01“…In keeping with the aforesaid approach, one segment at a time is selected, and the discourse that reflects it is analysed with a view to identifying transcendental notions contained therein. The latter are construed as a type of cognitive concepts which epitomise the core ideas inherent in a particular type of spoken or written discourse. …”
Get full text
Article -
125505
Causes of revision hip arthroplasty after hemiarthroplasty for femoral neck fracture
Published 2024-12-01“…The aim of the study is to analyse unsatisfactory outcomes of hemiarthroplasty and compare them with the similar outcomes of total hip arthroplasty in elderly patients with femoral neck fractures. …”
Get full text
Article -
125506
Clinical analysis of 1,038 cases of odontogenic jawbone cysts
Published 2024-11-01“…Abstract Background This study aims to analyse the clinical characteristics of different types of odontogenic jawbone cysts (OJCs) and to provide a theoretical basis for prevention and clinical treatment. …”
Get full text
Article -
125507
Study of some parameters of humoral immunity in asthmatic elderly patients
Published 2008-12-01“…<strong><br />Methods:</strong> Descriptive study of two case series: a group of 60 years-old asthmatic patients and a group of patients younger than 60 years. All of them were received in Cienfuegos Allergy External Consultation, during one year and quantities of immunoglobulin G, A and M were measured. …”
Get full text
Article -
125508
THE STORY OF DISTURBANCE IN THE QUR’AN: A STUDY OF THE TAFSIR AL-MISHBAH BY M. QURAISH SHIHAB
Published 2023-12-01“…Next, the interpretation is presented using Abd's thematic interpretation approach. Al-Hayy Al-Farmawī, namely, an interpretation that seeks direct answers from the Qur’an about a problem. …”
Get full text
Article -
125509
Identification of the Bovine <i>CSN3</i> Core Promoter Region and the Relationships Between <i>CSN3</i> Promoter Polymorphisms and the <i>CSN3</i> A and B Alleles
Published 2025-01-01“…This phenomenon is caused by single-nucleotide polymorphisms (SNPs) in the promoter region of <i>CSN3</i>, which encodes the B variant. Therefore, a series of 5′-deleted promoter plasmids were constructed to define the core promoter of <i>CSN3</i>. …”
Get full text
Article -
125510
Coordination of a Green Supply Chain with One Manufacturer and Two Competing Retailers under Different Power Structures
Published 2019-01-01“…The main objective of this research is to examine the role of power relationship in a two-level green supply chain which is made up of one shared manufacturer and two competitive retailers. We develop six game theory-based models to explore the members’ operational decisions in a supply chain taking into account three vertical power structures (Manufacturer Stackelberg, Retailer Stackelberg, and Vertical Nash) as well as two retailers’ horizontal power structure (Bertrand or Stackelberg competition). …”
Get full text
Article -
125511
Research of Internal Stress Distribution of Double Arc Flexspline
Published 2020-05-01Get full text
Article -
125512
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
Get full text
Article -
125513
Neo-BCV: A Novel Bacterial Liquid Complex Vaccine for Enhancing Dendritic Cell-Mediated Immune Responses Against Lung Cancer
Published 2025-01-01“…Conclusions: These findings highlight Neo-BCV’s potential as a safe and effective therapeutic strategy, offering a novel avenue for clinical translation in lung cancer immunotherapy.…”
Get full text
Article -
125514
Tolerogenic Splenic IDO+ Dendritic Cells from the Mice Treated with Induced-Treg Cells Suppress Collagen-Induced Arthritis
Published 2014-01-01“…Thus, the potential therapeutic effects of iTregs in CIA are likely maintained through the generation of tolerogenic DCs in vivo.…”
Get full text
Article -
125515
The Clinical Significance of Exhaled Nitric Oxide in Asthma
Published 2008-01-01“…Asthma is an inflammatory disease of the airways, for which many therapeutic options are available. Guidelines for the management of asthma suggest a stepwise approach to pharmacotherapy based on assessment of asthma severity and control. …”
Get full text
Article -
125516
Prognostic biomarker soluble ST2 exhibits diurnal variation in chronic heart failure patients
Published 2020-06-01“…The goal of this study was to investigate whether sST2 exhibits diurnal variation in patients with heart failure with reduced ejection fraction (HFrEF) and in control subjects, thereby enhancing its diagnostic and prognostic values. …”
Get full text
Article -
125517
Semi-analytical approach for solving the mathematical model of solid-phase diffusion in electrodes: An application of modified differential transform method
Published 2025-03-01“…These technologies demand higher efficiency and reliability, thereby providing robust mathematical methods are essential for optimizing species diffusion in lithium-ion (Li-ion) cells. …”
Get full text
Article -
125518
3 years survival of patients with multiple myeloma.
Published 2006-12-01“…Frequently we don’t identify the patients that could be cured with advanced therapies, nor even recognize those, in which we expect a long survival with the classic treatment measures. …”
Get full text
Article -
125519
Bessel Beam Diffraction by an Aperture in an Opaque Screen
Published 2015-01-01“…The scattering of the Bessel beam by a circular aperture in an opaque screen is investigated by the geometrical theory of diffraction approach. The geometrical optics and diffracted and scattered fields are obtained. …”
Get full text
Article -
125520
Case study of business model adaptation in the travel industry: targeting generation z
Published 2024-12-01“…Using a descriptive qualitative approach, data was collected through in-depth interviews, direct observation, social media content analysis, and internal company documents. Thematic analysis techniques were used to identify key patterns in the company's business adaptation strategies. …”
Get full text
Article