Suggested Topics within your search.
Suggested Topics within your search.
- Sociolinguistics 4
- Criminal law 3
- Philosophy 3
- Effective teaching 2
- Elementary school teaching 2
- English language 2
- History 2
- History and criticism 2
- Rhetoric 2
- Academic writing 1
- African American psychologists 1
- Anatomy 1
- Anthropometry 1
- Benefactors 1
- Black people 1
- Clinical cases 1
- Consumers 1
- Consumption (Economics) 1
- Criticism 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Economics 1
- Electrocardiography 1
- English 1
- Ethnopsychology 1
- Etiology 1
- Ex-convicts 1
- Fathers and sons 1
- Genanalyse 1
-
4561
Non-Fickian Solute Transport in a Single Fracture of Marble Parallel Plate
Published 2018-01-01“…Then breakthrough curves (BTCs) of solute transport are fitted using the classical advection-dispersion equation (ADE) and the truncation power-law function (TPL) model in the package of the continuous time random walk (CTRW). …”
Get full text
Article -
4562
Pigs, people, and proximity: a 6000-year isotopic record of pig management in Ireland
Published 2025-02-01Get full text
Article -
4563
Experimental Investigation of Innovative Internal Trailing Edge Cooling Configurations with Pentagonal Arrangement and Elliptic Pin Fin
Published 2008-01-01“…Over the endwall surface, the classic transient technique with thermochromic liquid crystals allows the measurement of a detailed heat transfer coefficient (HTC) map. …”
Get full text
Article -
4564
Basic reproduction number for certain infectious porcine diseases: estimation of required level of vaccination or depopulation of susceptible animals
Published 2020-09-01“…A systematic analysis has been undertaken with respect to the publications available on the estimation of R 0 for various virus isolates of African swine fever, classical swine fever, foot-and-mouth disease, porcine reproductive and respiratory syndrome, Aujeszky’s disease, hepatitis E, encephalomyocarditis, porcine circovirus type 2, as well as pleuropneumonia associated with Actinobacillus pleuropneumoniae, and diseases caused by pathogenic isolates of Mycoplasma hyopneumoniae. …”
Get full text
Article -
4565
An Atypical Presentation of a Male with Oral-Facial-Digital Syndrome Type 1 Related Ciliopathy
Published 2016-01-01“…We present a male patient with OFD1 mutation who lacks the classic OFD1 phenotype who presented with end-stage renal disease without evidence of polycystic changes within the kidneys.…”
Get full text
Article -
4566
Neural Density Functional Theory of Liquid-Gas Phase Coexistence
Published 2025-01-01“…We use supervised machine learning together with the concepts of classical density functional theory to investigate the effects of interparticle attraction on the pair structure, thermodynamics, bulk liquid-gas coexistence, and associated interfacial phenomena in many-body systems. …”
Get full text
Article -
4567
Static and dynamic experimental study of strengthened inforced short concrete corbel by using carbon fabrics, crack path in shear zone
Published 2015-09-01“…In fact, their functioning interestingly unconventional is compared to classical beam type elements. Then the effects of bending and shearing are combined in this case. …”
Get full text
Article -
4568
Historical development of veterinary pathology in turkey (1842-2002)
Get full text
Article -
4569
Extensive Prostatic Abscess in an Elderly Patient Requiring Multidisciplinary Drainage
Published 2020-01-01“…Prostatic abscess is rare and mainly affects immunocompromised individuals, classically presenting with both systemic and lower urinary tract symptoms. …”
Get full text
Article -
4570
ADDED VALUES OF SOCIAL CRM: THE EXAMINATION OF CUSTOMER PERSPECTIVE
Published 2015-05-01“…This study indicates that the most significant added values of SCRM compared to traditional CRM, of often called classic CRM, are: customers’ mutual collaboration and interactions, customers’ engagement and interactions with company, available and flexible interaction, and customers’ involvement. …”
Get full text
Article -
4571
Assessment of the teaching methods impact on the level of financial literacy
Published 2022-01-01“…The basic research method is a scientific experiment. Classical and innovative (interactive) forms and technologies of practical classes were used as the experimental material. …”
Get full text
Article -
4572
Analysis of the vacuum solution of the five-dimensional Einstein field equations with negative cosmological constant via variational symmetries
Published 2025-02-01“…The Kaluza-Klein theory can be reckoned as a classical unified field theory of two of the significant forces of nature gravitation and electromagnetism. …”
Get full text
Article -
4573
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01“…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
Get full text
Article -
4574
Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
Published 2024-01-01“…The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. The monitoring system detected three different emulated cyberattacks with high accuracy. …”
Get full text
Article -
4575
Investigation of the liquid-vapor equilibrium in the mixture of carbon dioxide and normal alkanes in binary systems using the Peng-Robinson equation of state modified with mixing r...
Published 2025-03-01“…This study uses the Peng-Robinson equation of state to investigate the vapor-liquid equilibrium in binary and non-ideal systems that contain CO2 and normal alkanes. The classic van der Waals mixing rule with binary interaction parameters enhanced by the Jaubert et al. aggregation model is employed, along with the Wong-Sandler mixing rule as a G-Excess model to improve phase equilibrium calculations. …”
Get full text
Article -
4576
Cybersecurity of the municipal infrastructure
Published 2023-03-01“…The impact of the latest information technologies (such as the Internet of Things, artificial intelligence, blockchain) on the development of municipal infrastructure, the use of these technologies to protect critical infrastructure from cyberattacks, their advantages and disadvantages compared to classical security technologies have been considered. …”
Get full text
Article -
4577
Anaerobically digested dairy fiber in soilless potting media for poinsettias
Published 2024-01-01“…Methods Poinsettias (Euphorbia pulcherrima âClassic Redâ) were grown in media containing peat-perlite in a 4:1 ratio or peat-ADDF-perlite in a 2:2:1 ratio. …”
Get full text
Article -
4578
Estimation of Wind Farm Losses Using a Jensen Model Based on Actual Wind Turbine Characteristics for an Offshore Wind Farm in the Baltic Sea
Published 2025-01-01“…Two models are used: the classical Jensen model, assuming a constant thrust coefficient (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mi>T</mi></msub></semantics></math></inline-formula>), and an updated model that incorporates the actual turbine-specific <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>C</mi><mi>T</mi></msub><mrow><mo>(</mo><mi>U</mi><mo>)</mo></mrow></mrow></semantics></math></inline-formula> characteristics. …”
Get full text
Article -
4579
Disseminated Candida lusitaniae: Nosocomial Acquisition Secondary to an Indwelling Urinary Catheter
Published 2021-01-01“…Despite this lack of apparent, classic risk factors, our patient developed endocarditis of his native valve due to C. lusitaniae fungemia from an indwelling urinary catheter. …”
Get full text
Article -
4580
A note on derivations in semiprime rings
Published 2005-01-01“…The converse is in general not true. A classical result of Herstein (1957) asserts that any Jordan derivation on a prime ring with characteristic different from two is a derivation. …”
Get full text
Article