-
2301
Degradation of cellular mir-27 by a novel, highly abundant viral transcript is important for efficient virus replication in vivo.
Published 2012-02-01“…Expression of the 3'-UTR of m169 by an adenoviral vector was sufficient to mediate its function, indicating that no other viral factors are essential in this process. …”
Get full text
Article -
2302
Prediction of coronary heart disease based on klotho levels using machine learning
Published 2025-05-01“…We evaluated the ability of five models constructed using logistic regression, neural networks, random forest, support vector machine, and eXtreme Gradient Boosting to predict CHD. …”
Get full text
Article -
2303
Simplified MS2 phage-like particle production including a novel maturation protein internal fusion affinity tag
Published 2025-12-01“…Expanding on prior improvements, this study establishes a revised set of plasmid vectors for Emesvirus zinderi (MS2) derived PLPs that streamline vector manipulations for rapid prototyping of new particles, provide validation of an alternative affinity tag for purification, and contributes a high-throughput low-volume spin column purification strategy. …”
Get full text
Article -
2304
Controlled Synthesis of TiB2-TiC Composite: Substantiation of the Homogenizing Joule Thermostatting Efficiency and Improvement of SHS-Compaction Technology in a Vacuum
Published 2024-09-01“…The task of controlled Joule heating is a compensation of the temperature gradient formed in the synthesized workpiece, which is solved by passing in it a direct current directed in line with the vector of propagation of the combustion wave. An indicator of assessment of the degree of compensation of the noted temperature gradient is the Seebeck effect, excited between the upper and lower surface of the SHS workpiece, which should be brought to zero in the process of Joule thermostatting. …”
Get full text
Article -
2305
Seismic Vulnerability Assessment of Reinforced Concrete Educational Buildings Using Machine Learning Algorithm
Published 2024-01-01“…The conventional three-step evaluation process for determining the seismic vulnerability of existing buildings is time-consuming and expensive, especially when dealing with a large building stock or a city. …”
Get full text
Article -
2306
Selecting a Programming Scheme for Memristor Elements
Published 2022-12-01“…An array of memristive elements can be used in prospective neural computing systems as a programmable resistance (analog multiplication factor) when performing operations of analog vector multiplication, discrete in time. To form the required resistance, the memristor should be subjected to a programming procedure. …”
Get full text
Article -
2307
High temperature absorption properties of SiOC ceramic matrix composite reinforced by continuous microwave- absorbing SiC fibers
Published 2025-01-01“…The SiC-BN/SiOC ceramic matrix composites are prepared through the precursor infiltration pyrolysis(PIP) process, using wave-absorbing SiC fibers with in-situ BN coatings as reinforcements and SiOC ceramic as the matrix. …”
Get full text
Article -
2308
PEaF-Production Environment Analyzer Framework: Assisting Continuous Deployment of 5G Workloads Using AI/ML
Published 2024-01-01“…A Production Environment Analyzer Framework (PEaF) is proposed to address the limitations of the Continuous Deployment (CD) process for 5G workflow lifecycle management. By integrating an AI/ML-based PEaF into the CD pipeline, we aim to ensure reliable deployments. …”
Get full text
Article -
2309
Modern State and civil society: promising directions and forms of interaction in the field of public administration
Published 2023-10-01“…It is emphasised that in the newest understanding of the paradigm of relations between the modern State and civil society, there is a socially oriented vector of the State, which is diverse and closely related to the needs of the population. …”
Get full text
Article -
2310
Russia and the Transforming European Security
Published 2019-12-01“…Since the end of the Cold War, Russia has retained world’s special attention as a key vector for both global and European security. While the energetic link is undeniable the backbone for EU-Russia relations, the sanctions game prove to be a stone corner for redefining not only the course of bilateral relations but the future of European security. …”
Get full text
Article -
2311
Rolling window for detecting multiple Chan signatures to diagnose excessive water production
Published 2025-04-01“…Throughout, an iterative optimization process, window size was determined as seven points, considering pattern duration. …”
Get full text
Article -
2312
Sysmon event logs for machine learning-based malware detection
Published 2025-12-01“…This study focuses on dynamic malware analysis using machine learning models to process detailed data from Sysmon Event Logs, a crucial sources of system information that record both running program activities. …”
Get full text
Article -
2313
Comparative analysis of heart disease prediction using logistic regression, SVM, KNN, and random forest with cross-validation for improved accuracy
Published 2025-04-01“…The novelty lies in the data preparation process, where numerical features were imputed using the mean, categorical features were imputed using chi-square methods, and normalization was applied. …”
Get full text
Article -
2314
«Smart City» in Socio-Political Projection (The Case of Barcelona)
Published 2022-02-01“…It is emphasized that information and communication technologies led to the transformation of a rigidly vertical bureaucratic system of exercising power and set the vector of its transition to a horizontal (network model) based on the effects of high technologies.It is noted that the modern model of exercising power in Barcelona presupposes the active involvement of citizens in the processes of city management, based on the use of technological platforms that simplify coworking processes.As a result of the study, the authors come to the conclusion that the contemporary paradigm of the “smart city” involves the involvement of citizens as active participants in decisionmaking and planning. …”
Get full text
Article -
2315
Strategic mapping of iterative technology development based on modular analysis of modification quality indicators
Published 2025-06-01“…To offset the degradation of engineering facilities, it is necessary to initiate innovative processes aimed at adding value to the product. Innovation is based on a target vector or strategy that describes the operations and resources needed to achieve a planned result. …”
Get full text
Article -
2316
Encrypted Image Retrieval System based on Features Analysis
Published 2018-07-01“…The proposed system consists of six phases briefly described as follows: first, feature extraction phase, which produces the low-level quantitative description of the image (color and texture) that allows the computation of similarity measures, the definition of the ordering of the images, and the indexing of the search processes. Second, indexing for search process phase, hash table and bloom filter were employed for classification. …”
Get full text
Article -
2317
Forming competitiveness of a specialist to-be in the youth policy system of the North-Caucasus Federal University
Published 2024-06-01“…The results obtained allow us to specify and anticipate the effectiveness of the institution of public associations in the university in the vector of forming a competitive specialist and confirm the foundations of the author’s dissertation research. …”
Get full text
Article -
2318
Cognitive Load Identification of Pilots Based on Physiological-Psychological Characteristics in Complex Environments
Published 2020-01-01“…Cognitive load is generated by pilots in the process of information cognition about aircraft control, and it is closely related to flight safety. …”
Get full text
Article -
2319
Optimization analysis of air cooled open cathode proton exchange membrane fuel cell flow channel structure
Published 2025-05-01“…In addition, in order to further improve the power density of the fuel cell, two agent models, support vector regression and Gaussian process regression, are constructed and trained, and a genetic algorithm is used to find the parameter optimization for the bending angle, width and height of the cathode channel. …”
Get full text
Article -
2320
PROPER: Personality Recognition Based on Public Speaking Using Electroencephalography Recordings
Published 2025-01-01“…The personality recognition process involves data acquisition, pre-processing, feature extraction and selection, and classification. …”
Get full text
Article