Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
generateddlte » generatelte (Expand Search)
generatedd » generate (Expand Search)
generateddlte » generatelte (Expand Search)
generatedd » generate (Expand Search)
-
821
Distinct types of fibrocyte can differentiate from mononuclear cells in the presence and absence of serum.
Published 2010-03-01“…The differentiation of fibrocytes remains poorly characterised and this has limited understanding of their biology and function. In particular two methods are used to generate fibrocytes in vitro that differ fundamentally by the presence or absence of serum.…”
Get full text
Article -
822
Sensing the Cultural Significance with AI for Social Inclusion
Published 2023-09-01“…This thesis explores the use of AI in a methodological framework to include the contribution of a larger and more diverse group of participants with user-generated data. …”
Get full text
Article -
823
Investigating the Impact of Mental Stress on Electrocardiological Signals through the Use of Virtual Reality
Published 2024-09-01“…The results show that the application of immersive VR generates higher mental stress levels than non-immersive VR, but in both cases, HRV changes (decreases), but more significantly in immersive VR. …”
Get full text
Article -
824
A Historical Approach to the Mirror Neuron System
Published 2025-01-01“…The initial enthusiasm manifested with the discovery of MN has been progressively nuanced, giving rise to a functional, neuroscientific perspective that requires more evidence on its therapeutic utility and applicability in areas of knowledge beyond health sciences.…”
Get full text
Article -
825
The vascular endothelium as decision maker in lung injury
Published 2025-07-01“…When the endothelium fails to perform these functions adequately, leading to endothelial dysfunction, pathological conditions are more likely to develop. …”
Get full text
Article -
826
Experimental Investigation on Damage Characteristics and Early Warning of Frozen Coal under Uniaxial Compression
Published 2023-01-01“…The test results showed that the compressive strength of the frozen coal samples decreased significantly, and the strength of the saturated frozen coal samples was the lowest; more acoustic emissions were generated at the initial loading stage. …”
Get full text
Article -
827
The Effect of Lubricant Viscosity Variation on Tooth Friction and Hence on the Energetic Behaviour of Gear Unit
Published 2024-12-01“…With this modification, the estimation generated by the mathematical model describing the energetic behavior of the gear unit can be made more accurate.…”
Get full text
Article -
828
Tremor and its duration‐amplitude distribution at Popocatépetl volcano, Mexico
Published 2016-09-01“…Abstract The duration‐amplitude distribution was calculated for the tremor observed at Popocatépetl volcano during episodes of activity in 2000 and 2012–2014. An exponential function was used to obtain a good fit for the duration‐amplitude distribution, and the source of volcanic tremor is probably generated by the transportation of magmatic fluids and its coupling with the host rock within the volcanic conduit. …”
Get full text
Article -
829
Design of smart agriculture based on big data and Internet of things
Published 2020-05-01“…The algorithm in this article can realize the functions of real-time data communication and information processing more efficiently, and has a significant role in promoting agricultural informatization and improving the level of agricultural modernization.…”
Get full text
Article -
830
Multipotent Mesenchymal Stem Cell Treatment for Discogenic Low Back Pain and Disc Degeneration
Published 2016-01-01“…Low back pain with resultant loss of function, decreased productivity, and high economic costs is burdensome for both the individual and the society. …”
Get full text
Article -
831
Design of the optimal groundwater quality monitoring network using a genetic algorithm based optimization approach
Published 2020-06-01“…In this paper, two conflicting objective functions are simultaneously solved. The first objective function is the maximization of the match between the interpolated EC distributions obtained from data of the all available monitoring wells and the wells from the newly generated network. …”
Get full text
Article -
832
The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis
Published 2025-07-01“…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
Get full text
Article -
833
Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN).
Published 2009-01-01“…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
Get full text
Article -
834
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
835
PERHITUNGAN NUMERIK RAPAT KEADAAN GRAPHENE BILAYER DENGAN MODEL TIGHT-BINDING MENGGUNAKAN METODE RAMBATAN WAKTU TROTTER-SUZUKI
Published 2023-08-01“…The number of atoms (sites) reviewed affects the regularity of the DOS calculation results. The more atoms that are reviewed, the more orderly the DOS calculations will be generated. …”
Get full text
Article -
836
-
837
Exploring public sector workforce attitudes toward AI competence and its impact on AI competence self-assessment
Published 2025-01-01“…Additionally, more than half of the respondents expressed limited trust in AI-generated information, with only seven participants fully trusting AI. …”
Get full text
Article -
838
Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors
Published 2024-12-01“…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
Get full text
Article -
839
Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS
Published 2025-06-01“…Firstly, an optimization objective function regarding the public security patrol path planning (S3P-Function) was abstracted from the actual situation; Moreover, this paper proposed an improved wolf-pack optimization algorithm named DAF-BRS-CWOA using Dynamic-Adjustment-Factor(DAF) and Balanced-Raid-Strategy (BRS), and DAF devoted to adjust the overall wolf-pack running strategy by dynamically adjusting the number of airdropped wolves during the stage of Summon-Raid while BRS with symmetric property was to improve both the algorithm’s global exploration as well as the local development capabilities by increasing the number of checking locations, that means not only checking the reverse position of the current wolf, but also the positions generated according to certain rules between the reverse position of the current wolf and the current optimal wolf during the stage of Summon-Raid; Finally, DAF-BRS-CWOA was adopted to optimize S3P-Function, forming a public security patrol path planning recommendation method based on DAF-BRS-CWOA (S3PRM-DAF-BRS-CWOA). 30 independent numerical experiments were conducted on 20 public classical datasets by DAF-BRS-CWOA compared with GA, PSO, WDX-WPOA. …”
Get full text
Article -
840
Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing
Published 2025-03-01“…Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. …”
Get full text
Article