Showing 861 - 880 results of 3,092 for search 'more function (genera OR generated)', query time: 0.18s Refine Results
  1. 861

    Optimum Design of Fibre Orientation in Composite Laminate Plates for Out-Plane Stresses by Rasoul Khandan, Siamak Noroozi, Philip Sewell, John Vinney, Mehran Koohgilani

    Published 2012-01-01
    “…By applying two failure criteria at the same time the results are more reliable. Experimentally generated results show a very good agreement with the numerical results, validating the simulated model used. …”
    Get full text
    Article
  2. 862

    HEE-SegGAN: A holistically-nested edge enhanced GAN for pulmonary nodule segmentation. by Yong Wang, Seri Mastura Mustaza, Mohammad Syuhaimi Ab-Rahman, Siti Salasiah Mokri

    Published 2025-01-01
    “…To mitigate mode collapse, we incorporated minibatch discrimination in the discriminator, encouraging diversity in the generated samples. We also improved the loss function to better capture edge-level details and enhance segmentation precision in edge regions. …”
    Get full text
    Article
  3. 863

    Transcriptional analysis of a unique set of genes involved in Schistosoma mansoni female reproductive biology. by Alexis A Cogswell, Valerie P Kommer, David L Williams

    Published 2012-01-01
    “…Schistosomiasis affects more than 200 million people globally. The pathology of schistosome infections is due to chronic tissue inflammation and damage from immune generated granulomas surrounding parasite eggs trapped in host tissues. …”
    Get full text
    Article
  4. 864
  5. 865

    Notes on Whitehead space of an algebra by M. Arian-Nejad

    Published 2002-01-01
    “…Let R be a ring, and denote by [R,R] the group generated additively by the additive commutators of R. …”
    Get full text
    Article
  6. 866

    Stem Cells as a Tool to Improve Outcomes of Islet Transplantation by Emily Sims, Carmella Evans-Molina

    Published 2012-01-01
    “…Stem cells have been utilized not only as a functional replacement for β cells, but also as companion or supportive cells to address a variety of different obstacles that prevent ideal graft viability and function. …”
    Get full text
    Article
  7. 867

    The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis by Jun Liu, Jingfang Wan, Kehong Chen, Yani He, Weiwei Zhang, Jiyuan Luo, Dan Li

    Published 2025-07-01
    “…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
    Get full text
    Article
  8. 868

    Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN). by Jonathan E Foley, Jing-Ruey J Yeh, Morgan L Maeder, Deepak Reyon, Jeffry D Sander, Randall T Peterson, J Keith Joung

    Published 2009-01-01
    “…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
    Get full text
    Article
  9. 869

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  10. 870

    Alterations in fecal microbiota composition and cytokine expression profiles in adolescents with depression: a case-control study by Yiwen Cheng, Zhangcheng Zhu, Zhi Yang, Xia Liu, Xiulian Qian, Juntao Zhu, Xinzhu Hu, Peijie Jiang, Tingting Cui, Yuwei Wang, Wenwen Ding, Wenhui Lei, Jie Gao, Jingchen Zhang, Yating Li, Li Shao, Zongxin Ling, Weiming Hu

    Published 2025-04-01
    “…Given the rising prevalence and substantial impact of adolescent depression on functional impairment and suicidality, it is essential to focus more on this age group. …”
    Get full text
    Article
  11. 871

    Comparative analysis of actinorhizal nodule and associated soil microorganism diversity and structure in three Alnus species by Aizi Tong, Wei Liu, Xiaoliang Liu, Junyi Zhu, You Zhou, Jianhua Li

    Published 2025-05-01
    “…The most significant taxon in the nodules of all the three alders was Frankia genus, which was negatively correlated with other six genera of microbes. The main function of microorganisms in alder nodules is nitrogen fixation, which is not affected by tree species and their habitats.ConclusionThese findings suggest that the host determines the microbial community composition in the root nodule of three alders. …”
    Get full text
    Article
  12. 872

    A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model by Aiguo Li, Yanfeng Deng

    Published 2025-01-01
    “…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
    Get full text
    Article
  13. 873

    Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect by Bibo Dai, Xingdong Zhao, Shuwen Zhang, Qian Kang, Zhonghua Zhu

    Published 2020-01-01
    “…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
    Get full text
    Article
  14. 874
  15. 875
  16. 876

    Culturomics Reveals Microbial Dynamics in the Apple Carposphere Across Developmental Stages, Altitude and Tissue Types by Ana María Sánchez, Jonàs Oliva, Cristina Solsona, Ahmed Abdelfattah, Neus Teixidó

    Published 2025-06-01
    “…Using 13 distinct culture media, 50% more microbial genera were recovered than conventional laboratory media, yielding over 919 isolates, consisting of 489 bacteria, 222 filamentous fungi and 208 yeasts. …”
    Get full text
    Article
  17. 877
  18. 878

    Identification of Ecological Security Pattern and Ecological Restoration Zoning Strategy in the Shandong Section of the Beijing-Hangzhou Grand Canal by Chizhou Xu, Yande Jing, Yiwen Zhang, Yingchun Liu, Wenyang Yin, Shiping Zhao

    Published 2025-02-01
    “…Additionally, 40 ecological corridors, 48 ecological pinch points, and 75 ecological barrier points were generated, densely distributed in the east. The area was divided into five core functional zones. (4) Conclusions: Establishing ecological function zones and considering landscape changes from high-frequency human activities in spatial planning can lead to a more reasonable division of ecological restoration areas. …”
    Get full text
    Article
  19. 879

    TRF1 and TRF2 form distinct shelterin subcomplexes at telomeres by Tomáš Janovič, Gloria I. Perez, Greta Boelting, Jens C. Schmidt

    Published 2025-09-01
    “…To quantitatively analyze shelterin function, we generated a panel of human cancer cell lines expressing HaloTagged shelterin proteins from their endogenous loci. …”
    Get full text
    Article
  20. 880

    Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors by Jiumei Zhao, Jing Zhu, Yu Tang, Kepu Zheng, Ziwei Li

    Published 2024-12-01
    “…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
    Get full text
    Article