Suggested Topics within your search.
Suggested Topics within your search.
-
3841
A Systematic Review of Research Trends in Water, Sanitation, and Hygiene (WASH) in Indonesia
Published 2024-11-01“…This study also identifies several research gaps relating to topic selection, thematic focus, and regional coverage that should be addressed in future WASH studies in Indonesia.…”
Get full text
Article -
3842
Statistical Distributions of Genome Assemblies Reveal Random Effects in Ancient Viral DNA Reconstructions
Published 2025-01-01“…We tested if differences between real and random assemblies could be detected from their statistical distributions. Our analysis shows that the coverage distributions of (1) real viral aDNA assemblies of adenovirus (ADV), herpesvirus (HSV) and papillomavirus (HPV) do not follow power laws nor log-normal laws, (2) (ADV) and control aDNA assemblies are well approximated by log-normal laws, (3) negative control parvovirus B19 (real and random) follow a power law with infinite variance and (4) the mapDamage negative control with non-ancient DNA (modern ADV) and the mapDamage positive control (human mtDNA) are well approximated by the negative binomial distribution, consistent with the Lander–Waterman model. …”
Get full text
Article -
3843
DRUG PROVISION OF HIV INFECTED CRIMINALS IN INSTITUTIONS OF CRIMINAL-EXECUTIVE SYSTEM OF KRASNODAR REGION
Published 2017-10-01“…The investigation was conducted on the basis of statistic data, medical statements and accounting to reports of the penitentiary medical organization using methods of analysis, documentary observation, grouping and comparison of data.Results and discussion. …”
Get full text
Article -
3844
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
3845
In vitro assessment of fracture resistance of endodontically treated teeth restored with short fiber reinforced resin based composite and ceramic overlays
Published 2025-02-01“…Abstract Background Conventional full-coverage crowns are used after endodontic treatment to enhance the fracture toughness of these teeth. …”
Get full text
Article -
3846
Definition of the marketing management categorical apparatus
Published 2020-06-01“…The presented study is devoted to the coverage of the issues related to the development of the potential of a modern employee. …”
Get full text
Article -
3847
Advancing Future Amyotrophic Lateral Sclerosis Medicines by Incorporating The Patient Voice Into Patient-Centered Holistic Measurement Strategies for Clinical and Real-World Studie...
Published 2025-05-01“…Abstract Introduction This analysis sought to understand the patient experience in amyotrophic lateral sclerosis (ALS) and to assess whether commonly used clinical outcome assessments (COAs) reliably and validly capture that experience. …”
Get full text
Article -
3848
Global pneumococcal sequence cluster lineage for invasive pneumococcal isolates in Denmark from summer 2019 to 2023
Published 2025-07-01“…Serotyping, multilocus sequence typing (MLST), GPSC identification, and phylogenetic analysis to assess clonal relationships were conducted. …”
Get full text
Article -
3849
Hybrid GIS-Transformer Approach for Forecasting Sentinel-1 Displacement Time Series
Published 2025-07-01“…Initial experiments on a regular dataset from Lombardy employed Long Short-Term Memory (LSTM) models to forecast multiple future time steps. Empirical analysis determined that optimal forecasting is achieved with a 50-time-step input sequence, and that predicting 10% of the input sequence length strikes a balance between temporal coverage and accuracy. …”
Get full text
Article -
3850
The feasibility of using high resolution genome sequencing of influenza A viruses to detect mixed infections and quasispecies.
Published 2009-09-01“…Two waterfowl cloacal swabs were included in the analysis. Full-length sequences of all segments were obtained with 20 to 787-X coverage for the ten viruses and one cloacal swab. …”
Get full text
Article -
3851
Association Between County-Level Social Vulnerability and Vaccine-Related Attitudes and Hesitancy Toward COVID-19 Vaccination in the United States
Published 2024-12-01“…We developed Poisson models with robust variance estimation. The analysis also included the association of county social vulnerability with parental COVID-19 vaccine hesitancy. …”
Get full text
Article -
3852
Effects of Eucalyptus Tree Plantations and Croplands on Selected Soil Physicochemical Properties in Lake Bunyonyi Sub-Catchment of South-Western Uganda.
Published 2024“…The study findings on the spatial coverage of eucalyptus in the study area showed an increase of 10.3% and 26.5% between 1988 to 2005 and 2005 to 2022 in EP cover, respectively. …”
Get full text
Thesis -
3853
Population dynamics and monitoring applied to decision-making
Published 2024-10-01“…Their paper provides a good example of why Bayesian analysis is particularly suited to many management problems. …”
Get full text
Article -
3854
Diffusion and Risks of House Prices in the Netherlands
Published 2018-02-01“…Chapter 6 is concerned with the efficiency and loss coverage of the index-based home-value insurance scheme. …”
Get full text
Article -
3855
Comprehensive genomic study of Plasmodium falciparum in Sierra leone: genetic variation and resistance patterns
Published 2025-07-01“…A total of 35 samples underwent sequencing using the MGISEQ and Illumina platforms, resulting in high-coverage genomic data. Population structure was assessed using PCA, NJ trees, and STRUCTURE analysis, alongside comparisons with a global dataset from the pf3k project. …”
Get full text
Article -
3856
Whole-genome resequencing reveals collagen-related genes in Kele pigs.
Published 2024-01-01“…<h4>Results</h4>Our sequencing results revealed that 241.04 G of clean data, Q30 reached 93.96% and the average coverage depth was 9.04×. After data analysis, the SNP annotation of Kele pigs identified 4,570 high-impact mutation sites that could result in protein function loss, with SNPs primarily distributed in the intronic and exonic regions. …”
Get full text
Article -
3857
Integrating political prioritisation into national surgical planning: a scoping review of surgical, obstetric and anaesthesia care in Cameroon
Published 2024-12-01“…Policy opportunities include leveraging existing multilateral partnerships to unify SOA actors, conducting national assessments of SOA care capacity, formalisation of task shifting to build capacity, defining essential SOA procedures, including surgical care in future health coverage, and defining and including SOA benchmarks in strategic planning.Conclusions Integrating a framework for political prioritisation into a situational analysis of SOA care is critical to understanding an LMIC’s policy context and actors, in addition to issue severity. …”
Get full text
Article -
3858
The impact of land use/land cover change on ecosystem services in Golestan province
Published 2019-06-01“…We also used sensitivity analysis to explore the robustness of results by 50% adjustment of value coefficients. …”
Get full text
Article -
3859
Eco-anxiety, climate concern, and fatalistic outlooks: Insights from U.S. crisis text conversations on climate distress
Published 2025-03-01“…Using a structured, iterative thematic analysis approach that combined deductive and inductive methods, the study identified and categorized emerging themes. …”
Get full text
Article -
3860
DENTAL STATUS OF BRONZE AGE POPULATION FROM THE AREA OF MODERN POLTAVA REGION (ACCORDING TO THE ANTHROPOLOGICAL MATERIALS)
Published 2022-09-01“…However, the difference was determined in the form of coverage of the chewing organs with teeth mineralized deposits. …”
Get full text
Article