Search

Your search keyword '"Kyungho Lee"' showing total 477 results

Search Constraints

Start Over You searched for: Author "Kyungho Lee" Remove constraint Author: "Kyungho Lee"
477 results on '"Kyungho Lee"'

Search Results

1. Validation of prediction model for successful discontinuation of continuous renal replacement therapy: a multicenter cohort study

2. Impact of anemia requiring transfusion or erythropoiesis-stimulating agents on new-onset cardiovascular events and mortality after continuous renal replacement therapy

3. Kidney double positive T cells have distinct characteristics in normal and diseased kidneys

4. Effects of poly (ADP-ribose) polymerase inhibitor treatment on the repair process of ischemic acute kidney injury

5. An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning

6. Single cell and spatial transcriptomics analysis of kidney double negative T lymphocytes in normal and ischemic mouse kidneys

7. Assessment of ship-block stacking status based on images obtained from drone and geographic information system data

8. The impact of preoperative kidney replacement therapy on kidney outcome and survival in patients with left ventricular assist device

9. Prognostic significance of albuminuria in elderly of various ages with diabetes

10. Engineering nanoscale H supply chain to accelerate methanol synthesis on ZnZrO x

11. Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File

12. Prediction tool for renal adaptation after living kidney donation using interpretable machine learning

13. T cell metabolic reprogramming in acute kidney injury and protection by glutamine blockade

14. Credit Card Fraud Detection: An Improved Strategy for High Recall Using KNN, LDA, and Linear Regression

15. Role of T cells in ischemic acute kidney injury and repair

16. Early postoperative urinary MCP-1 as a potential biomarker predicting acute rejection in living donor kidney transplantation: a prospective cohort study

18. Will EU’s GDPR Act as an Effective Enforcer to Gain Consent?

19. DHA Induces Cell Death through the Production of ROS and the Upregulation of CHOP in Fibroblast-like Synovial Cells from Human Rheumatoid Arthritis Patients

20. PKR-Mediated Phosphorylation of eIF2a and CHK1 Is Associated with Doxorubicin-Mediated Apoptosis in HCC1143 Triple-Negative Breast Cancer Cells

21. A Review of Insider Threat Detection Approaches With IoT Perspective

22. Detection of 8-oxoguanine and apurinic/apyrimidinic sites using a fluorophore-labeled probe with cell-penetrating ability

23. Dietary Modification Alters the Intrarenal Immunologic Micromilieu and Susceptibility to Ischemic Acute Kidney Injury

24. Modeling Uremic Vasculopathy With Induced Pluripotent Stem Cell-Derived Endothelial Cells as a Drug Screening System

25. Poly (ADP-Ribose) Polymerase Inhibitor Treatment as a Novel Therapy Attenuating Renal Ischemia-Reperfusion Injury

26. Activation of ERK and p38 Reduces AZD8055-Mediated Inhibition of Protein Synthesis in Hepatocellular Carcinoma HepG2 Cell Line

27. Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

28. The Association between Peri-Transplant RBC Transfusion and Graft Failure after Kidney Transplantation: A Nationwide Cohort Study

29. Detecting Anomalous Transactions via an IoT Based Application: A Machine Learning Approach for Horse Racing Betting

30. Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme

31. A Multi-Component Analysis of CPTED in the Cyberspace Domain

32. Optimizing Vehicle Routing for Simultaneous Delivery and Pick-Up Considering Reusable Transporting Containers: Case of Convenience Stores

33. Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective

34. 13.6 A 16Gb 37Gb/s GDDR7 DRAM with PAM3-Optimized TRX Equalization and ZQ Calibration.

35. A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service

37. Advanced Approach to Information Security Management System Model for Industrial Control System

38. The Need for Specific Penalties for Hacking in Criminal Law

39. Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

50. A 0.64μm 4-Photodiode 1.28μm 50Mpixel CMOS Image Sensor with 0.98e- Temporal Noise and 20Ke- Full-Well Capacity Employing Quarter-Ring Source-Follower.

Catalog

Books, media, physical & digital resources