-
12521
Decolonisation and Downshift-Knowledge Reproduction in Africa
Published 2024-08-01“…The education curriculum left behind by colonial governments was designed to make African nations economically and technologically dependent on developed nations. Such a pattern of education was not geared toward African technological development, but rather conditioned African nations to be consumers rather than producers, with the resulting loss of initiative among the Africans. …”
Get full text
Article -
12522
An Unusual Diagnosis of Sporadic Type III Osteogenesis Imperfecta in the First Day of Life
Published 2022-01-01“…It usually is inherited by an autosomal dominant pattern, but it can sometimes occur sporadically. …”
Get full text
Article -
12523
Low susceptibility of invasive red lionfish (Pterois volitans) to a generalist ectoparasite in both its introduced and native ranges.
Published 2014-01-01“…We assessed the susceptibility of red lionfish to parasitic gnathiid isopods in both their native Pacific and introduced Atlantic ranges via experimental field studies during which lionfish and other, ecologically-similar reef fishes were caged and exposed to gnathiid infestation on shallow coral reefs. …”
Get full text
Article -
12524
Association between body roundness index and incidence of type 2 diabetes in a population-based cohort study
Published 2025-04-01“…The analysis also uncovered a non-linear pattern in this relationship, pinpointed by an inflection point at a BRI value of 3.96. …”
Get full text
Article -
12525
The effect of surface texturing in the sliding surface on tribological characteristics of alloy steel under wet condition
Published 2021-06-01“…The tribological characteristics are mostly dependent upon the different pattern and methods of surface texturing. This research works investigates lubricated wear behaviour on circular dimples textured EN-31 alloy steel materials using DUCOM linear reciprocating tribometer. …”
Get full text
Article -
12526
Attentional modulation of secondary somatosensory and visual thalamus of mice
Published 2024-11-01“…In mice trained to respond to tactile stimuli and ignore visual stimuli, POm was robustly activated by touch and largely unresponsive to visual stimuli. A different pattern was observed when mice were trained to respond to visual stimuli and ignore touch, with POm now more robustly activated during visual trials. …”
Get full text
Article -
12527
SPECIFICITY OF IMPLEMENTATION OF AUTHOR VITAL METAPHORS IN DOCTOR ZHIVAGO BY BORIS PASTERNAK
Published 2021-09-01“…It has been established that the implementation of the author's metaphor during the translation from the source language to the target language is interpreted in three stages: identiication (revealing the presence of the metaphor itself), decoding (isolating the elements of the metaphoric mechanism, consisting in hidden comparison), materialization (the actual verbal embodiment of the original metaphor in a foreign cultural pattern). …”
Get full text
Article -
12528
Mathematical modelling of golden apple drying and performance evaluation of solar drying systems using energy and exergy approach
Published 2025-03-01“…The average exergy efficiency followed the same pattern as energy efficiency, with SAH 1 and Dryer 1 being higher than SAH 2 and Dryer 2 on both days. …”
Get full text
Article -
12529
Tracking Fin Whale Morphology with Drone Photogrammetry: Growth Tendencies, Developmental Changes, and Sexual Dimorphism
Published 2025-04-01“…Morphological changes during body development measurements are crucial in understanding growth rates, allometric relationships, and sexual dimorphism. …”
Get full text
Article -
12530
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
12531
Spatio-temporal variations in carbon sources, sinks and footprints of cropland ecosystems in the Middle and Lower Yangtze River Plain of China, 2013–2022
Published 2025-05-01“…The spatial distribution pattern of the above three indicators was more in the north and less in the south. (4) Cropland ecosystems exhibited carbon sinks. …”
Get full text
Article -
12532
Incremental Reinforcement Learning for Portfolio Optimisation
Published 2025-06-01“…However, its performance declined during the COVID-19 pandemic, highlighting susceptibility to rapid market changes. …”
Get full text
Article -
12533
Integrated Sensor System for Real-Time Monitoring and Detection of Fish Quality and Spoilage
Published 2024-05-01“…A pattern recognition system, employing a robust LDA-XGBoost model, was employed to differentiate between fresh and spoiled fish. …”
Get full text
Article -
12534
Medelacide: the intentional and systematic destruction of healthcare infrastructure
Published 2025-02-01“…The case study illustrates how the act of medelacide may be identified during the first year of the Israeli government’s genocide in Gaza, Palestine. …”
Get full text
Article -
12535
Automatic mouse ultrasound detector (A-MUD): A new tool for processing rodent vocalizations.
Published 2017-01-01“…House mice (Mus musculus) emit complex ultrasonic vocalizations (USVs) during social and sexual interactions, which have features similar to bird song (i.e., they are composed of several different types of syllables, uttered in succession over time to form a pattern of sequences). …”
Get full text
Article -
12536
Multi-scale spatio-temporal graph neural network for urban traffic flow prediction
Published 2025-07-01“…Abstract The Urban traffic flow is affected by both internal supply and demand changes and external random disturbances, and during its continuous spatiotemporal propagation, these factors overlap with each other, presenting a highly non-linear and complex spatiotemporal pattern, which poses a huge challenge to traffic flow prediction. …”
Get full text
Article -
12537
On liver damage at generalized form of coxiellosis. Case report
Published 2018-12-01“…Anamnesis showed that raw milk was consumed. During 1.5 months, high steady fever, weakness, sweating and anorexia were observed, with further moderate pain in a right abdominal wing. …”
Get full text
Article -
12538
Problems Faced by Tribes in Collection and Marketing of Tendu (Diospyros melanoxylon Roxb.) Fruit in Jhalawar District of Rajasthan
Published 2025-01-01“… The present study was conducted during September to December, 2022 to focus on the problems in collection and marketing of tendu fruit by tribes in Jhalawar district of Rajasthan. …”
Get full text
Article -
12539
Exhaustive sampling of docking poses reveals binding hypotheses for propafenone type inhibitors of P-glycoprotein.
Published 2011-05-01“…Furthermore, the binding hypotheses for both catalytic states were analyzed and showed only small differences in their protein-ligand interaction fingerprints, which indicates only small movements of the ligand during the catalytic cycle.…”
Get full text
Article -
12540
Evaluation of the prevalence and influencing factors on poly-pharmacy among elderly patients - A review
Published 2024-10-01“…Based on the findings, there was a relationship between the source of obtaining information about drugs and the pattern of PHP consumption. The findings of the present study showed that PHP leads to serious complications in the elderly. …”
Get full text
Article