Suggested Topics within your search.
Suggested Topics within your search.
-
981
Research status and development trends of dust concentration monitoring technology
Published 2024-12-01Get full text
Article -
982
Network Pseudohealth Information Recognition Model: An Integrated Architecture of Latent Dirichlet Allocation and Data Block Update
Published 2020-01-01“…The research results show that (1) the LDA model can deeply mine the semantic information of network pseudohealth information, obtain the features of document-topic distribution, and classify and train topic features as input variables; (2) the dataset partitioning method can effectively block data according to the text attributes and class labels of network pseudohealth information and can accurately classify and integrate the block data through the data block reintegration method; and (3) considering that the combination model has certain limitations on the detection of network pseudohealth information, the support vector machine (SVM) model can extract the granularity content of data blocks in pseudohealth information in real time, thus greatly improving the recognition performance of the combination model.…”
Get full text
Article -
983
COVID-Inconfidentes - SARS-CoV-2 seroprevalence in two Brazilian urban areas in the fourth quarter 2020: study protocol and initial results
Published 2023-06-01“…A household survey was conducted between October and December 2020, in two historic cities of Brazil's mining region. Anti-SARS-CoV-2 antibody was detected using the Wondfo® rapid test. …”
Get full text
Article -
984
-
985
Thyroid-stimulating hormone and thyroid hormone levels in association with occupational hazards in male coal miners
Published 2025-04-01“…ObjectiveTo investigate the associations between occupational hazard exposure and thyroid-stimulating hormone (TSH) and thyroid hormone levels in male coal mine workers. MethodsA cross-sectional study design was adopted. …”
Get full text
Article -
986
Causal knowledge graph construction for enterprise innovation events in the digital economy and its application to strategic decision-making
Published 2025-06-01“…Our method first extracts enterprise-related events using neural language models, then identifies causal links between events with a specialized classifier, and finally integrates these into a knowledge graph that can support strategic decision-making. …”
Get full text
Article -
987
HETEROZYGOUS PATHOGENIC MASP2 VARIANT ASSOCIATED WITH INFANTILE GIANT CELL HEPATITIS WITH AUTOIMMUNE HAEMOLYTIC ANAEMIA IN A CHILD
Published 2024-10-01“…An in-house data analysis pipeline was applied to deter mine familial segregation using Sanger sequencing. …”
Get full text
Article -
988
-
989
The Roles of Transcrustal Magma- and Fluid-Conducting Faults in the Formation of Mineral Deposits
Published 2025-05-01“…At hydrocarbon fields, they play extremely important roles in conductive and convective heat, as well as in mass transfer to the area of hydrocarbon generation, determining the relationship between the processes of lithogenesis and tectogenesis, and activating the generation of hydrocarbons from oil and gas source rock. Detection of TCMFCFs was carried out using MMSS (the method of microseismic sounding) and MTSM (the magnetotelluric sounding method), in combination with other geological and geophysical data. …”
Get full text
Article -
990
Associated minerals in chrysotile deposits and their potential health risks
Published 2025-05-01“…An asbestiform variety of the pyroxene diopside was detected in chrysotile from the Balangero mine in Italy. …”
Get full text
Article -
991
IFN-α-2b Reduces Postoperative Arthrofibrosis in Rats by Inhibiting Fibroblast Proliferation and Migration through STAT1/p21 Signaling Pathway
Published 2023-01-01“…The inhibitory effect of IFN-α-2b on fibroblast proliferation and migration in vitro was detected by cell counting kit-8 (CCK-8), immunofluorescence analysis, cell cycle test, EdU assay, wound healing test, and Transwell method, and the analysis results were verified by Western blotting method. …”
Get full text
Article -
992
-
993
GCBAM-UNet: Sun Glare Segmentation Using Convolutional Block Attention Module
Published 2024-12-01Get full text
Article -
994
Extra-aural disorders in patients with acoustic trauma who were in the zone of the antiterrorist operation.
Published 2015-11-01“…Diencephalic structures irritation was detected in 54,2%, stem-diencephalic - in 30,5% of cases. …”
Get full text
Article -
995
Artificial Intelligence: The Strategy of Financial Risk Management
Published 2024-07-01Get full text
Article -
996
Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes
Published 2022-09-01“…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
Get full text
Article -
997
-
998
-
999
Alteration of Cytokine Profiles in Uranium Miners Exposed to Long-Term Low Dose Ionizing Radiation
Published 2014-01-01“…The aim of the study is to estimate the immune function through cytokine profiles in sera of uranium mines. Methods. Antibody arrays were used to detect 50 cytokines in sera of uranium miners. …”
Get full text
Article -
1000
Microbial landscape of wounds in patients with combat trauma of extremities
Published 2024-12-01“…The wound samples were cultured on nutrient media and microorganisms were identified in accordance with standard methods and procedures. Results. According to the results of microbiological analysis of wound samples, the growth of microorganisms was detected in 91.5% of patients. …”
Get full text
Article