Showing 4,221 - 4,240 results of 12,255 for search '"Greats"', query time: 0.09s Refine Results
  1. 4221

    Os mesteirais e o concelho de Lisboa durante o século XIV: um esboço de síntese (1300-1383) by Bruno Marconi da Costa

    Published 2017-06-01
    “…With the interference of the royal power, knights, great merchants, squires, clerics and literati monopolized the council's positions, creating a real oligarchy. …”
    Get full text
    Article
  2. 4222

    SIMULATION ANALYSIS OF IMPACT DYNAMIC RESPONSE OF A COAL PLOW BIT by KANG XiaoMin, WANG WeiChao

    Published 2021-01-01
    “…It provides theoretical references for the material selection of plow bit, the design and optimization of plow bit structure, the improvement of plow bit reliability, and the reasonable selection of the working parameters such as plow speed. It is of great significance to the design of China’s coal mining machinery and the development of coal industry.…”
    Get full text
    Article
  3. 4223

    Right Ventricular Outflow Tract Perforation and Stenting for a Premature Neonate with Pulmonary Valve Atresia and Double Outlet Right Ventricle by Mohammed Rasool Hussein, Maysam Yousif Abed, Nabeeha Najatee Akram

    Published 2024-12-01
    “…In this report, we present the successful results of using percutaneous transcatheterization in a high-risk patient; a 6-h premature neonate who had DORV, PVA with other anomalies including situs inversus, levocardia, D-malposed great arteries without patent ductus arteriosus. …”
    Get full text
    Article
  4. 4224

    IP-based high-available mass network storage system by HAN De-zhi1, YU Shun-zheng1

    Published 2007-01-01
    “…,a server channel and a high-speed network-attached channel,by which the I/O performance is improved and server bottlenecks are reduced;fourthly,high availability is attained by way of a high-available file system.In addition,in the experiment concerned,the MNSS has proved to be a network storage system with great capacity producing an ultra-high-throughput for both the file I/O and the block I/O,characterized by better performance,scalability,availability and cost performance,etc.when compared with those systems already on the market.…”
    Get full text
    Article
  5. 4225

    Enterprise Digital Transformation and Stock Price Crash Risk: Evidences from China by Xiaotong Song

    Published 2022-01-01
    “…In this context, enterprise digital transformation and stock price crash risk have gained unprecedented attention. It is of great value for both industry and the government to analyze the influence and mechanism of enterprise digital transformation (EDT) on stock price crash risks. …”
    Get full text
    Article
  6. 4226

    Application of K-means algorithm based on A-D model in calling abnormal customer mining by Jian ZHOU, Yongge SHI, Meibin HE

    Published 2018-04-01
    “…In order to make use of massive voice communication records and cluster high-quality clients (telecom fraud clients,advertisers) with various kinds of voice communication abnormalities,a behavioral feature model of abnormal voice communication customers was designed and constructed.Based on the model,a clustering analysis algorithm for customers with abnormal voice communication behavior was proposed.First of all,by analyzing the call records of customers,the characteristics of call behaviors was got,such as the number of calls,call rates,and so on.Then AHP-DEMATEL model was constructed by blending the AHP model and DEMATEL method.Secondly,based on the model,an improved K-means algorithm was proposed to cluster the abnormal clients according to the voice communication records.Finally,the real data was used to verify the analysis.The results show that compared with other similar algorithms,the proposed algorithm improves the performance of multi-type abnormal customer comprehensive clustering analysis and single-type abnormal customer clustering analysis greatly.…”
    Get full text
    Article
  7. 4227

    The potentials of rural tourism in developing rural areas in Albania by Henrietta Nagy, József Káposzta, Bledar Meta

    Published 2017-12-01
    “…But as for other rural areas which have a great potential for development of rural tourism, they are not preferred by the population either to live because they do not have developed agriculture. …”
    Get full text
    Article
  8. 4228

    Application of Prior-knowledge for Intelligent Gear Fault Diagnosis Under Variable Speed Condition by Pan Can, Li Weihua

    Published 2018-01-01
    “…The vibration mechanism analysis of gear transmission system shows that,the vibration response signal of a gear transmission system contains interference components that vary greatly with the speed and cannot reflect the fault information,the fault characteristics in amplitude spectrum of the vibration response signal have less sensitivity to the variation of running speed. …”
    Get full text
    Article
  9. 4229

    Evaluation of Urban Water System Development from the Perspective of Space by XIE Qianwen, LIU Jiangtao, WEI Jie, REN Dawei

    Published 2022-01-01
    “…To adapt to the reform of spatial planning in the new era,this study evaluates the urban water system from the new perspective of space and lays the foundation for the future use of spatial means to realize the optimization and sustainable development of urban water system functions.Taking Shenzhen as an example,this paper divides its urban water system space into four types,namely,resource ecology space,engineering facility space,water-city integrated space,and safety risk space,and evaluates them from the dimensions of the total space,composition and layout,system carrying capacity,and space quality.The results indicate that the space occupancy rate of the water system is generally low,and the local water resources and the carrying capacity of the water environment are limited,which are vulnerable to multiple disasters of floods and surges.The potential risk areas are mainly distributed in densely populated areas and industry-intensive areas.The spatial service quality of the water system has great potential for improvement considering the low biodiversity of rivers and lakes,the insufficient attraction of waterfront space,and a low proportion of the complex utilization of facility space.…”
    Get full text
    Article
  10. 4230

    Numerical Modeling of a Hot Plate Stove for Peanut Roasting by Anthony Agyei-Agyemang, Michael Kweku Commeh, Peter Oppong Tawiah, Benjamin Atribawuni Asaaga

    Published 2022-01-01
    “…Heat treatment, especially roasting, is known to reduce harmful fungal species and mycotoxin formation to a great extent. Experiments were conducted for heat treatment and the effects of introducing different fin configurations. …”
    Get full text
    Article
  11. 4231

    Differentially private sequence generative adversarial networks for data privacy masking by Yu ZHANG, Xixiang LYU, Yucong ZOU, Yige LI

    Published 2020-08-01
    “…Based on generative adversary networks and the differential privacy mechanism,a differentially private sequence generative adversarial net (DP-SeqGAN) was proposed,with which the privacy of text sequence data sets can be filtered out.DP-SeqGAN can be used to automatically extract important features of a data set and then generate a new data set which was close to the original one in terms of data distributions.Based on differential privacy,randomness is introduced to the model,which improves the privacy of the generated data set and further reduces the over fitting of the discriminator.The proposed DP-SeqGAN was universal,so there is no need to adjust the model adaptively for datasets or design complex masking rules against dataset characters.The experiments show that the privacy and usability of a sequence data set are both improved significantly after it is processed by the DP-SeqGAN model,and DP-SeqGAN can greatly reduce the success rate of member inference attacks against the generated data set.…”
    Get full text
    Article
  12. 4232

    Teologia „małej ojczyzny” ks. Franciszka Mantheya by Jarosław Babiński

    Published 2019-10-01
    “…This is typical of the Pomerania inhabitants in his generation. This is a great cultural inheritance, but often becomes problematic when it comes to determining national belonging. …”
    Get full text
    Article
  13. 4233

    La Tentation de saint Antoine de Flaubert et Uspud d’Erik Satie : affinités secrètes et résonances en filigrane by Bruna Donatelli

    Published 2019-06-01
    “…Among the audacious artists who experimented new forms of hybrid art (magic shows, shadow plays, pantomimes, burlesque) in these cabarets, we count also Erik Satie, a great admirer of Flaubert and his works. In the wake of other adaptations of La Tentation de saint Antoine, performed in the Chat Noir and L’Auberge du Clou shadow theatres, Satie composed Uspud, ballet chrétien en trois actes, of which, together with Contamine de Latour, he also wrote the booklet. …”
    Get full text
    Article
  14. 4234

    Professional Disease Management Guide for Ornamental Plants by Philip F. Harmon, S. D. Bledsoe

    Published 2012-06-01
    “…Florida’s warm, humid environment is a gardener’s paradise and a great location for ornamental plant producers to grow numerous plant species—but these conditions also are suitable for the development of a wide variety of plant pathogens and insects that can spread them. …”
    Get full text
    Article
  15. 4235

    An integrated optimization model of network behavior victimization identification based on association rule feature extraction by Shengli ZHOU, Linqi RUAN, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yuanbo LIAN

    Published 2023-08-01
    “…The identification of the risk of network behavior victimization was of great significance for the prevention and warning of telecom network fraud.Insufficient mining of network behavior features and difficulty in determining relationships, an integrated optimization model for network behavior victimization identification based on association rule feature extraction was proposed.The interactive traffic data packets generated when users accessed websites were captured by the model, and the implicit and explicit behavior features in network traffic were extracted.Then, the association rules between features were mined, and the feature sequences were reconstructed using the FP-Growth algorithm.Finally, an analysis model of telecom network fraud victimization based on network traffic analysis was established, combined with the stochastic forest algorithm of particle swarm optimization.The experiments show that compared with general binary classification models, the proposed model has better precision and recall rates and can effectively improve the accuracy of network fraud victimization identification.…”
    Get full text
    Article
  16. 4236

    Fast Computation of Singular Oscillatory Fourier Transforms by Hongchao Kang, Xinping Shao

    Published 2014-01-01
    “…More importantly, the presented method in this paper is also a great improvement of a Filon-type method and a Clenshaw-Curtis-Filon-type method shown in Kang and Xiang (2011) and the Chebyshev expansions method proposed in Kang et al. (2013), for computing the above integrals.…”
    Get full text
    Article
  17. 4237

    Cells Electrical Characterization: Dielectric Properties, Mixture, and Modeling Theories by Nida Nasir, Mahmoud Al Ahmad

    Published 2020-01-01
    “…This study suggests that techniques presented for single-cell analysis (SCA) are always precise and hold great scope compared to those for cell mixture. SCA plays a promising role in disease diagnosis and treatment planning, as it not only detects the cells but also helps in identification. …”
    Get full text
    Article
  18. 4238

    Microstructure characterization of porous microalloyed aluminium-silicate ceramics by Purenović Jelena, Mitić V.V., Paunović V., Purenović M.

    Published 2011-01-01
    “…Grain size distribution for untreated and treated samples was done with software SemAfore 4. It has shown great variety in size distribution of grains from clay powders to sintered samples.…”
    Get full text
    Article
  19. 4239

    Damages of Underground Facilities in Coal Mines due to Gas Explosion Shock Waves: An Overview by Dezhi Ran, Jianwei Cheng, Rui Zhang, Yu Wang, Yuhang Wu

    Published 2021-01-01
    “…For many years, researchers have already done a great lot of works to study damages caused by the impact of shock waves of the gas explosions in underground mines. …”
    Get full text
    Article
  20. 4240

    Influence maximization algorithm of social networks based on Transformer model by YU Shuke, YAO Yao, YAN Chenxue

    Published 2024-12-01
    “…The network topology structure based influence maximization algorithms are greatly influenced by the network structure, which leads to unstable performance of social networks of different scales and different topology structures. …”
    Get full text
    Article