Results 121 to 130 of about 1,654,513 (343)
This report describes the potential of vacuum differential mobility spectrometry (DMS) as an additional separation dimension to reduce liquid chromatography (LC‐MS) analysis time while maintaining good quantitative performance. A 1‐min trap/elute LC‐vDMS‐SIM/MS method for quantification of 11 drugs of abuse was developed and applied to the analysis of ...
Maria Fernanda Cifuentes Girard+2 more
wiley +1 more source
Waxy‐ or putty‐like materials has emerged as a novel drug preparation for synthetic cannabinoids and other drugs in UK prisons. An in vitro CB1 bioassay was used to evaluate the CB1 activating potential of MDMB‐INACA and extracts from eight seized samples. MDMB‐INACA had moderate efficacy but low potency at CB1.
Axelle Timmerman+9 more
wiley +1 more source
CAR:a P2P content addressable andauto-retrievable algorithm for MANET
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1+2 more
doaj +2 more sources
CPHASH: a cache-partitioned hash table
CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition.
Z. Metreveli+2 more
semanticscholar +1 more source
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario Thevis+2 more
wiley +1 more source
Prey species adjust their behavior along human‐use gradients by balancing risks from predators and humans. During hunting seasons, prey often exhibit strong antipredator responses to humans but may develop tolerance in suburban areas to exploit human‐mediated resources.
Heather N. Abernathy+8 more
wiley +1 more source
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao+4 more
doaj +1 more source
A Revisit on Deep Hashings for Large-scale Content Based Image Retrieval [PDF]
There is a growing trend in studying deep hashing methods for content-based image retrieval (CBIR), where hash functions and binary codes are learnt using deep convolutional neural networks and then the binary codes can be used to do approximate nearest neighbor (ANN) search.
arxiv
HH inhibits the androgen/AR and TGF‐β1/Smad signaling pathways, and may offer a novel therapeutic approach for BPH treatment. ABSTRACT Benign prostate hyperplasia (BPH) is characterized by abnormal prostate epithelial and stromal cell growth, which leads to bladder outlet obstruction (BOO) and lower urinary tract symptoms (LUTS).
Buyun Kim+11 more
wiley +1 more source
Lock-free dynamic hash tables with open addressing [PDF]
Hui Gao+2 more
openalex +1 more source