Suggested Topics within your search.
Suggested Topics within your search.
-
241
Serum miR-130a-3p and miR-326: Correlation with Airway Inflammation and Prognostic Implications in Pediatric Bronchial Asthma
Published 2025-04-01“…The elevation of serum levels of IL-4, TGF-β 1 and CKLF-1 increased the risk of asthma and poor prognosis, but IL-10, miR-130a-3p and miR-326 were protective factors (P < 0.05).Conclusion: The decreased levels of serum miR-130a-3p and miR-326 were related to airway inflammation in children with bronchial asthma. …”
Get full text
Article -
242
-
243
Applying bioinformatic analysis for prognostic assessment of the <i>HS3ST6</i> missense mutations clinical significance in the development of hereditary angioedema
Published 2023-02-01“…Hereditary angioedema (HAE) is a genetically determined disease characterized by recurrent attacks of edema affecting the subcutaneous and/or submucosal layers of tissue, face, lips, neck, extremities of the body, oral cavity, intestine and/or larynx. …”
Get full text
Article -
244
Design, synthesis and evaluation of benzodioxole and bromofuran tethered 1,2,4-triazole hybrids as potential anti breast cancer agents with computational insights
Published 2025-07-01“…Among all the synthesized compounds, compound 12b demonstrated an excellent IC50 value of 3.54 ± 0.265 µg/mL. Additionally, in silico studies, such as molecular docking to predict the orientation of the compounds, molecular dynamics simulations to evaluate binding stability with the target protein, drug-likeness studies to evaluate Lipinski’s rule of five and Jorgensen’s rule of three, DFT analysis to determine the energy gap of the frontier molecular orbitals (FMOs) and the molecular electrostatic potential (MEP) for identifying sites of nucleophilic and electrophilic attacks, were also conducted.…”
Get full text
Article -
245
InvSim algorithm for pre-computing airplane flight controls in limited-range autonomous missions, and demonstration via double-roll maneuver of Mirage III fighters
Published 2025-07-01“…This mathematical framework incorporates (1) body axes (fixed in the airplane at its center of gravity), (2) inertial axes (fixed in the earth/ground at the take-off point), wind axes (aligned with the flight path/course), (3) spherical flight path angles (azimuth angle measured clockwise from the geographic north, and elevation angle measured above the horizon plane), and (4) spherical flight angles (angle of attack and sideslip angle). …”
Get full text
Article -
246
Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit
Published 2019-05-01“…The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. …”
Get full text
Article -
247
In-context learning for propaganda detection on Twitter Mexico using large language model meta AI
Published 2025-09-01“…This study explores the application of Large Language Models (LLMs) for detecting political propaganda on Twitter, focusing on manipulative political narratives during the 2018 Mexican presidential election. Using LLaMA 3.2, we implement a few-shot prompting within an In-Context Learning framework to classify tweets as propagandist or non-propagandist. …”
Get full text
Article -
248
Islamist Terrorist Activity in 2000-2020: A Scoring Methodology
Published 2024-12-01“…Based on the Global Terrorism Database and the author’s sample of 155 groups broadcasting Islamist ideology, three stages of the development of Islamist terrorism were identified, a direct proportional relationship between the number of terrorist attacks and the number of victims was proven, and the geography of Islamist terrorist activity was analyzed. …”
Get full text
Article -
249
Theoretical and Experimental Study of Corrosion Behavior of Carbon Steel Surface in 3.5% NaCl and 0.5 M HCl with Different Concentrations of Quinolin-2-One Derivative
Published 2022-02-01“…Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. …”
Get full text
Article -
250
Impact of large-scale social restrictions on air quality (NO₂, CO, O₃) during COVID-19: Surabaya case study, Indonesia
Published 2025-04-01“…It was identified as an attack on humans and spread very quickly almost all over the world. …”
Get full text
Article -
251
Loss of Cullin 5 in myeloid cells protects against autoimmune neuroinflammation
Published 2025-08-01“…Autoimmune neuroinflammation occurs when an individual’s immune cells attack the brain, spinal cord or peripheral nerves. …”
Get full text
Article -
252
-
253
-
254
Fabrication of Highly Dispersed Cu/α-FeOOH via Green Rust and Its Application in Hydrogenation of Methyl Palmitate
Published 2025-06-01“…Combining the characterization results, activity test results, and the temperature and pressure changes in the reactor during the reaction, the following reaction mechanism was proposed: the highly dispersed Cu0 species on the catalyst surface and the abundant Lewis acid sites on the Fe3O4 surface synergistically participate in the activation and dissociation of H2 and the activation and conversion reaction of methyl palmitate; H2 dissociates into active H· on Cu0, and the C=O bond of methyl palmitate is adsorbed and activated on the Lewis acid sites on the Fe3O4 surface; the generated H· attack the activated C=O bonds and promote the dissociation of methyl palmitate to generate hexadecanol; the Lewis acid sites occupied by O atoms react with H2 to achieve the regeneration of Lewis acid sites. …”
Get full text
Article -
255
Survey of Moving Target Defense in Power Grids: Design Principles, Tradeoffs, and Future Directions
Published 2025-01-01Get full text
Article -
256
Highly-Efficient Hardware Architecture for ML-KEM PQC Standard
Published 2025-01-01“…Furthermore, the implementation incorporates several methods to effectively mitigate side-channel attacks, a common concern in hardware-based cryptosystem deployments. …”
Get full text
Article -
257
Hypertension and Headache: the Effect of Antihypertensive Drugs
Published 2019-07-01Get full text
Article -
258
Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Published 2014-01-01Get full text
Article -
259
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
Published 2019-01-01“…Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. …”
Get full text
Article -
260
Efficacy of iguratimod in the treatment of patients with palindromic rheumatism ineffective to methotrexate or hydroxychloroquine
Published 2025-06-01“…The results demonstrated a significant reduction in the number of attacks over a three-month period (1.3 ± 1.4 vs. 5.8 ± 2.0, P < 0.0001). …”
Get full text
Article