Suggested Topics within your search.
Suggested Topics within your search.
-
1461
An abrupt centennial-scale drought event and mid-holocene climate change patterns in monsoon marginal zones of East Asia.
Published 2014-01-01“…Abrupt climate events are always associated with changes in large-scale circulation patterns; therefore, investigations into abrupt climate changes provide clues for responses of circulation patterns to extreme climate events. …”
Get full text
Article -
1462
-
1463
Distinct white matter alteration patterns in post-infectious and gradual onset chronic fatigue syndrome revealed by diffusion MRI
Published 2025-07-01“…PI-ME/CFS and GO-ME/CFS patients were recruited based on consensus diagnoses made by two experienced clinicians and compared their diffusion MRI features with those of rigorously matched healthy controls (HCs) with sedentary lifestyles. …”
Get full text
Article -
1464
WXG100 protein superfamily consists of three subfamilies and exhibits an α-helical C-terminal conserved residue pattern.
Published 2014-01-01“…In the current work we discuss the evolutionary relationship between the homo- and heterodimeric WXG100 proteins, the basis of the oligomeric state and the key structural features of the conserved sequence pattern of WXG100 proteins. …”
Get full text
Article -
1465
POSITRON EMISSION TOMOGRAPHY IN PATIENTS WITH DRUG RESISTANT TEMPORAL LOBE EPILEPSY WITH DIFFERENT ICTAL PROPAGATION PATTERNS IN SCALP EEG
Published 2021-04-01“…The clinical, electrophysiological and imaging features were evaluated and a statistical comparison was performed between the groups. …”
Get full text
Article -
1466
Modern lineages of Mycobacterium tuberculosis exhibit lineage-specific patterns of growth and cytokine induction in human monocyte-derived macrophages.
Published 2012-01-01“…There is, however, little information available as to whether these patterns of immune subversion are features of individual strains or characteristic of broad clonal lineages of M. tuberculosis.…”
Get full text
Article -
1467
Ecological Security Patterns Based on Ecosystem Service Assessment and Circuit Theory: A Case Study of Liaoning Province, China
Published 2025-06-01“…Constructing ecological security patterns (ESPs) has become a crucial strategy for mitigating environmental stress and promoting sustainable social development. …”
Get full text
Article -
1468
Common neural patterns of substance use disorder: a seed-based resting-state functional connectivity meta-analysis
Published 2025-06-01“…Abstract Background Substance use disorder (SUD) shares common clinical features, including impulsive and compulsive behaviors, which are associated with dysfunctions in the brain’s reward circuit. …”
Get full text
Article -
1469
Outcomes and treatment patterns in primary and secondary plasma cell leukemia: insights from a large US cohort study
Published 2025-04-01“…Disease presentation, clinical and genetic characteristics, and treatment patterns of 93 patients with primary PCL and 57 with secondary PCL were described. …”
Get full text
Article -
1470
-
1471
The changing profile of neonatal pathogens and susceptibility pattern: prospective observational study from a tertiary center in South India
Published 2023-10-01“…Introduction: Changing the pattern of neonatal pathogens poses challenges to the management of neonatal sepsis. …”
Get full text
Article -
1472
Analyzing gait data measured by wearable cyborg hybrid assistive limb during assisted walking: gait pattern clustering
Published 2024-12-01“…For each measured item, principal component analysis was applied to the gait time-series data to extract the features of the gait patterns, followed by hierarchical cluster analysis to generate subgroups based on the principal component scores. …”
Get full text
Article -
1473
Trait dissociation in borderline personality disorder: influence on immediate therapy outcomes, follow-up assessments, and self-harm patterns
Published 2025-12-01“…Background: Dissociative symptoms are suggested to compete with the effectiveness of psychotherapeutic treatment and frequently co-occur with early life trauma and self-harm patterns, including self-injury, suicidal ideation, and suicide attempts, which are characteristic for borderline personality disorder (BPD).Objective: We explore the connections between dissociation and other BPD features like self-harm and childhood traumatization and examine the impact of trait dissociation on both immediate and follow-up psychotherapy outcomes.Method: In this naturalistic prospective evaluation study, we investigated psychopathology including general psychological distress (SCL-90), depression (BDI-II), and borderline-specific pathology (BSL) in 131 patients with BPD pre and post of a certified 8-week inpatient Dialectical Behaviour Therapy (DBT), as well as 3- and 6-month post inpatient treatment. …”
Get full text
Article -
1474
-
1475
Value of MRI radiomics based on intratumoral and peritumoral heterogeneity in predicting spatial patterns of locally recurrent high-grade gliomas
Published 2025-07-01“…Two radiologists independently assessed the spatial patterns of locally recurrence HGGs through continuous follow-up MRI data, and primarily categorized the pattern into intra-resection cavity recurrence and extra-resection cavity recurrence. …”
Get full text
Article -
1476
-
1477
-
1478
Methylation and gene expression patterns in adamantinomatous craniopharyngioma highlight a panel of genes associated with disease progression-free survival
Published 2025-06-01“…Differential methylation patterns were categorized into Methyl-Set1 (hypomethylated in ACP-A and hypermethylated in ACP-B) and Methyl-Set2 (hypermethylated in ACP-A and hypomethylated in ACP-B). …”
Get full text
Article -
1479
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
Published 2019-01-01“…Then, all the detected intensity values are encrypted by using public key cryptography algorithm to obtain the final ciphertext. The use of basis patterns allows for high-quality reconstruction. In addition, randomness in the permutation operation and public key cryptography provide a strong security feature for the encryption system. …”
Get full text
Article -
1480