Showing 1,961 - 1,980 results of 7,085 for search 'more function (generated OR general)', query time: 0.22s Refine Results
  1. 1961

    Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN). by Jonathan E Foley, Jing-Ruey J Yeh, Morgan L Maeder, Deepak Reyon, Jeffry D Sander, Randall T Peterson, J Keith Joung

    Published 2009-01-01
    “…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
    Get full text
    Article
  2. 1962

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  3. 1963
  4. 1964

    Analysis of the anatomical and biomechanical characteristics of the pelvic floor in cystocele by Chuqiao Song, Wei Wen, Lei Pan, Jiaqian Sun, Yun Bai, Jinhua Tang, Chen Zhong, Bangmin Han, Shujie Xia, Yiping Zhu

    Published 2023-12-01
    “…Material and methods In this observational case‐controlled study (clinical trial identifier BOJI201855L), 102 women with normal pelvic floor function and 273 patients diagnosed with cystocele degrees I–III were identified at Shanghai General Hospital from October 2016 to December 2019. …”
    Get full text
    Article
  5. 1965

    scRNA-Seq reveals age-dependent microglial evolution as a determinant of immune response following spinal cord injury by Lufei Shao, Yueliang Chang, Jinfang Liu, Leilei Lin, Long Chang, Jialin Zhang, Zhibin Lan, Honglai Zhang, Xiaolei Chen

    Published 2024-12-01
    “…Spinal cord injury (SCI) is a debilitating condition of the central nervous system (CNS) that leads to severe impairments in sensory and motor functions. Previous studies have pointed out that patient age is a critical factor influencing SCI prognosis. …”
    Get full text
    Article
  6. 1966

    Prevalence of daily family meals among children and adolescents from 43 countries by José Francisco López‐Gil, Lee Smith, Mark A. Tully, Julio Álvarez‐Pitti, Santiago F. Gómez, Helmut Schröder

    Published 2025-01-01
    “…The meta package was utilized for conducting a meta‐analysis of single proportions, specifically applying the metaprop function. The analysis involved pooling the data using a random‐effects model and presenting the outcomes through a forest plot generated using the inverse variance method. …”
    Get full text
    Article
  7. 1967

    A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model by Aiguo Li, Yanfeng Deng

    Published 2025-01-01
    “…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
    Get full text
    Article
  8. 1968

    Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect by Bibo Dai, Xingdong Zhao, Shuwen Zhang, Qian Kang, Zhonghua Zhu

    Published 2020-01-01
    “…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
    Get full text
    Article
  9. 1969

    Proverbs and Sayings of the Swahili Language in Written Discourse by Victoria S. Shatokhina

    Published 2025-07-01
    “…Media texts skillfully use the allegorical function of proverbs and thereby make the text of articles and headlines sound even more vividly and accurately, which once again confirms the relevance of the use of paremiological units in modern texts, including in written discourse.…”
    Get full text
    Article
  10. 1970
  11. 1971
  12. 1972

    Quasi-Mittag-Leffler Projective Synchronization of Delayed Chaotic Fractional Order Neural Network with Mismatched Parameters by Xin Sui, Yongqing Yang

    Published 2025-06-01
    “…Compared to existing results, the QMLPS introduced in this paper is more general, incorporating many existing synchronization concepts. …”
    Get full text
    Article
  13. 1973
  14. 1974

    Le mari de Jill Biden l’a emporté sur le mari de Melania : la construction référentielle dans la presse people sur Internet by Mathilde Salles

    Published 2021-12-01
    “…Many definite descriptions, such as Jill Biden's husband to designate Joe Biden and Melania's husband to designate Donald Trump, appear unrelated to the subject matter of the articles, and sometimes in contexts where a personal pronoun would be more appropriate than a nominal expression. We first point out how much these definite descriptions deviate from the ordinary uses of highly specified referring expressions in general and definite descriptions in particular and what risks some of them, falling within the category of Milner's “presuppositional anaphors”, may present for the good referential interpretation. …”
    Get full text
    Article
  15. 1975

    A progress in the inverse matrix method in QCD sum rules by Zhen-Xing Zhao, Yi-Peng Xing, Run-Hui Li

    Published 2024-10-01
    “…Considering that the narrow-width approximation may still be a good approximation, we separate the ground state from the spectral density. We then follow the general steps of the inverse matrix method to extract physical quantities such as decay constants that we may be more interested in.…”
    Get full text
    Article
  16. 1976

    EVALUATING DEGREE OF ACTIVE POWER LOSSES REDUCTION IN THE ELECTRIC POWER LINES WITH REACTIVE POWER COMPENSATION by V. N. Radkevich, M. N. Tarasova

    Published 2016-02-01
    “…They perform mathematical analysis of the obtained functional relations and study the function by means of derivatives. …”
    Get full text
    Article
  17. 1977

    Modern Concepts of Clinical and Diagnostic Criteria for Premature Ovarian Failure (Literature Review) by M. D. Salimova, Ya. G. Nadelyaeva, I. N. Danusevich

    Published 2021-01-01
    “…POI, defined as amenorrhea due to the loss of ovarian function before 40 years of age, can occur spontaneously or be secondary to medical therapies. …”
    Get full text
    Article
  18. 1978

    Intuitionistic Hesitant Fuzzy Rough Aggregation Operator-Based EDAS Method and Its Application to Multi-Criteria Decision-Making Problems by Muhammad Kamraz Khan, Muhammad Sajjad Ali Khan, Kamran, Ioan-Lucian Popa

    Published 2024-12-01
    “…In conclusion, a numerical example of the constructed model is demonstrated, and a general comparison between the investigated models and the current methods demonstrates that the investigated models are more feasible and efficient than the present methods.…”
    Get full text
    Article
  19. 1979
  20. 1980