Search alternatives:
largest decrease » larger decrease (Expand Search), marked decrease (Expand Search)
linear decrease » linear increase (Expand Search)
teer decrease » mean decrease (Expand Search), greater decrease (Expand Search)
cnn decrease » nn decrease (Expand Search), mean decrease (Expand Search), _ decrease (Expand Search)
_ largest » _ large (Expand Search)
_ cnn » _ can (Expand Search)
largest decrease » larger decrease (Expand Search), marked decrease (Expand Search)
linear decrease » linear increase (Expand Search)
teer decrease » mean decrease (Expand Search), greater decrease (Expand Search)
cnn decrease » nn decrease (Expand Search), mean decrease (Expand Search), _ decrease (Expand Search)
_ largest » _ large (Expand Search)
_ cnn » _ can (Expand Search)
-
1
-
2
-
3
-
4
-
5
The effect of HA digestion and HA replenishment alone or with CS on barrier function measured by TEER.
Published 2025“…(B) Hyaluronidase treatment (n = 8) gradually increased TEER, this significantly differed from the untreated group (n = 8) and the PS treated group (n = 8) (p < 0,001). …”
-
6
-
7
BA attenuated the decrease in the integrity and increase in the permeability of the epithelial barrier injury induced by LPS in Caco2 cell monolayers.
Published 2024“…(<b>B)</b> BA alleviated the LPS-induced decrease in TEER in Caco2 cells after treatment for 24 h. …”
-
8
-
9
Y-27632 collaborated with BA to attenuate the increase in the integrity and decrease in the permeability of epithelial barrier injury induced by LPS in Caco2 monolayers.
Published 2024“…<p>(<b>A)</b> Y-27632 collaborated with BA to attenuate the effect of LPS on TEER in Caco2 cells on days 1–22. …”
-
10
-
11
-
12
CNN framework.
Published 2025“…We propose to implement both MLP (Multilayer Perceptron) and CNN (Convolutional Neural Networks) based on conventional methods to detect the Denial of Services (DDoS) attack. …”
-
13
CNN frameworks.
Published 2025“…We propose to implement both MLP (Multilayer Perceptron) and CNN (Convolutional Neural Networks) based on conventional methods to detect the Denial of Services (DDoS) attack. …”
-
14
-
15
-
16
-
17
-
18
-
19
-
20