Search

Your search keyword '"Kyungho Lee"' showing total 127 results

Search Constraints

Start Over You searched for: Author "Kyungho Lee" Remove constraint Author: "Kyungho Lee" Language english Remove constraint Language: english
127 results on '"Kyungho Lee"'

Search Results

1. Validation of prediction model for successful discontinuation of continuous renal replacement therapy: a multicenter cohort study

2. Impact of anemia requiring transfusion or erythropoiesis-stimulating agents on new-onset cardiovascular events and mortality after continuous renal replacement therapy

3. Kidney double positive T cells have distinct characteristics in normal and diseased kidneys

4. Effects of poly (ADP-ribose) polymerase inhibitor treatment on the repair process of ischemic acute kidney injury

5. An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning

6. Single cell and spatial transcriptomics analysis of kidney double negative T lymphocytes in normal and ischemic mouse kidneys

7. Assessment of ship-block stacking status based on images obtained from drone and geographic information system data

8. Prognostic significance of albuminuria in elderly of various ages with diabetes

9. The impact of preoperative kidney replacement therapy on kidney outcome and survival in patients with left ventricular assist device

10. Engineering nanoscale H supply chain to accelerate methanol synthesis on ZnZrO x

11. Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File

12. Prediction tool for renal adaptation after living kidney donation using interpretable machine learning

13. T cell metabolic reprogramming in acute kidney injury and protection by glutamine blockade

14. Role of T cells in ischemic acute kidney injury and repair

15. Credit Card Fraud Detection: An Improved Strategy for High Recall Using KNN, LDA, and Linear Regression

16. Early postoperative urinary MCP-1 as a potential biomarker predicting acute rejection in living donor kidney transplantation: a prospective cohort study

18. Will EU’s GDPR Act as an Effective Enforcer to Gain Consent?

19. DHA Induces Cell Death through the Production of ROS and the Upregulation of CHOP in Fibroblast-like Synovial Cells from Human Rheumatoid Arthritis Patients

20. A Review of Insider Threat Detection Approaches With IoT Perspective

21. Detection of 8-oxoguanine and apurinic/apyrimidinic sites using a fluorophore-labeled probe with cell-penetrating ability

22. PKR-Mediated Phosphorylation of eIF2a and CHK1 Is Associated with Doxorubicin-Mediated Apoptosis in HCC1143 Triple-Negative Breast Cancer Cells

23. Dietary Modification Alters the Intrarenal Immunologic Micromilieu and Susceptibility to Ischemic Acute Kidney Injury

24. Modeling Uremic Vasculopathy With Induced Pluripotent Stem Cell-Derived Endothelial Cells as a Drug Screening System

25. Poly (ADP-Ribose) Polymerase Inhibitor Treatment as a Novel Therapy Attenuating Renal Ischemia-Reperfusion Injury

26. Activation of ERK and p38 Reduces AZD8055-Mediated Inhibition of Protein Synthesis in Hepatocellular Carcinoma HepG2 Cell Line

27. Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

28. The Association between Peri-Transplant RBC Transfusion and Graft Failure after Kidney Transplantation: A Nationwide Cohort Study

29. Detecting Anomalous Transactions via an IoT Based Application: A Machine Learning Approach for Horse Racing Betting

30. Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme

31. A Multi-Component Analysis of CPTED in the Cyberspace Domain

32. Optimizing Vehicle Routing for Simultaneous Delivery and Pick-Up Considering Reusable Transporting Containers: Case of Convenience Stores

33. Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective

34. A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service

35. Advanced Approach to Information Security Management System Model for Industrial Control System

36. The Need for Specific Penalties for Hacking in Criminal Law

37. Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

38. Tackling Faceless Killers: Toxic Comment Detection to Maintain a Healthy Internet Environment.

39. IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories

40. Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems

41. Data De-identification Framework.

42. Activation of ERK and p38 Reduces AZD8055‐Mediated Inhibition of Protein Synthesis in Hepatocellular Carcinoma HepG2 Cell Line

43. Dietary Modification Alters the Intrarenal Immunologic Micromilieu and Susceptibility to Ischemic Acute Kidney Injury

44. Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme

45. Factors Affecting Corporate Security Policy Effectiveness in Telecommuting

46. Impact Analysis of Resilience Against Malicious Code Attacks via Emails.

47. Understanding the Stability of Deep Control Policies for Biped Locomotion

48. A Multi-Component Analysis of CPTED in the Cyberspace Domain

49. Direct parameter extraction of SiGe HBTs for the VBIC bipolar compact model

50. Terpenes from Forests and Human Health

Catalog

Books, media, physical & digital resources