Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 2
- Language and languages 2
- Sociolinguistics 2
- ART / Digital 1
- Computer animation 1
- Digital cinematography 1
- Electric circuit analysis 1
- Electric network analysis 1
-
1961
Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN).
Published 2009-01-01“…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
Get full text
Article -
1962
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
1963
-
1964
Analysis of the anatomical and biomechanical characteristics of the pelvic floor in cystocele
Published 2023-12-01“…Material and methods In this observational case‐controlled study (clinical trial identifier BOJI201855L), 102 women with normal pelvic floor function and 273 patients diagnosed with cystocele degrees I–III were identified at Shanghai General Hospital from October 2016 to December 2019. …”
Get full text
Article -
1965
scRNA-Seq reveals age-dependent microglial evolution as a determinant of immune response following spinal cord injury
Published 2024-12-01“…Spinal cord injury (SCI) is a debilitating condition of the central nervous system (CNS) that leads to severe impairments in sensory and motor functions. Previous studies have pointed out that patient age is a critical factor influencing SCI prognosis. …”
Get full text
Article -
1966
Prevalence of daily family meals among children and adolescents from 43 countries
Published 2025-01-01“…The meta package was utilized for conducting a meta‐analysis of single proportions, specifically applying the metaprop function. The analysis involved pooling the data using a random‐effects model and presenting the outcomes through a forest plot generated using the inverse variance method. …”
Get full text
Article -
1967
A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model
Published 2025-01-01“…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
Get full text
Article -
1968
Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect
Published 2020-01-01“…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
Get full text
Article -
1969
Proverbs and Sayings of the Swahili Language in Written Discourse
Published 2025-07-01“…Media texts skillfully use the allegorical function of proverbs and thereby make the text of articles and headlines sound even more vividly and accurately, which once again confirms the relevance of the use of paremiological units in modern texts, including in written discourse.…”
Get full text
Article -
1970
Causal and synthetic associations of variants in the SERPINA gene cluster with alpha1-antitrypsin serum levels.
Published 2013-01-01“…Overall, our meta-analysis of lung function in ever-smokers does not support a functional role of common SNPs in the SERPINA gene cluster in the general population.…”
Get full text
Article -
1971
A New Extention of the Odd Inverse Weibull-G Family of Distributions: Bayesian and Non-Bayesian Estimation with Engineering Applications
Published 2024-11-01“…This generator is considered as a generalization of the three well-known families. …”
Get full text
Article -
1972
Quasi-Mittag-Leffler Projective Synchronization of Delayed Chaotic Fractional Order Neural Network with Mismatched Parameters
Published 2025-06-01“…Compared to existing results, the QMLPS introduced in this paper is more general, incorporating many existing synchronization concepts. …”
Get full text
Article -
1973
-
1974
Le mari de Jill Biden l’a emporté sur le mari de Melania : la construction référentielle dans la presse people sur Internet
Published 2021-12-01“…Many definite descriptions, such as Jill Biden's husband to designate Joe Biden and Melania's husband to designate Donald Trump, appear unrelated to the subject matter of the articles, and sometimes in contexts where a personal pronoun would be more appropriate than a nominal expression. We first point out how much these definite descriptions deviate from the ordinary uses of highly specified referring expressions in general and definite descriptions in particular and what risks some of them, falling within the category of Milner's “presuppositional anaphors”, may present for the good referential interpretation. …”
Get full text
Article -
1975
A progress in the inverse matrix method in QCD sum rules
Published 2024-10-01“…Considering that the narrow-width approximation may still be a good approximation, we separate the ground state from the spectral density. We then follow the general steps of the inverse matrix method to extract physical quantities such as decay constants that we may be more interested in.…”
Get full text
Article -
1976
EVALUATING DEGREE OF ACTIVE POWER LOSSES REDUCTION IN THE ELECTRIC POWER LINES WITH REACTIVE POWER COMPENSATION
Published 2016-02-01“…They perform mathematical analysis of the obtained functional relations and study the function by means of derivatives. …”
Get full text
Article -
1977
Modern Concepts of Clinical and Diagnostic Criteria for Premature Ovarian Failure (Literature Review)
Published 2021-01-01“…POI, defined as amenorrhea due to the loss of ovarian function before 40 years of age, can occur spontaneously or be secondary to medical therapies. …”
Get full text
Article -
1978
Intuitionistic Hesitant Fuzzy Rough Aggregation Operator-Based EDAS Method and Its Application to Multi-Criteria Decision-Making Problems
Published 2024-12-01“…In conclusion, a numerical example of the constructed model is demonstrated, and a general comparison between the investigated models and the current methods demonstrates that the investigated models are more feasible and efficient than the present methods.…”
Get full text
Article -
1979
-
1980