Showing 81 - 100 results of 33,120 for search '"Integrity"', query time: 0.09s Refine Results
  1. 81
  2. 82

    Hydrilla Integrated Management by Jennifer L. Gillett-Kaufman, Verena-Ulrike Lietze, Emma N.I. Weeks

    Published 2014-08-01
    “…IPM-207/IN1044: Hydrilla Integrated Management (ufl.edu) …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    The Analysis of Contour Integrals by Tanfer Tanriverdi, JohnBryce Mcleod

    Published 2008-01-01
    “…For any 𝑛, the contour integral 𝑦=cosh𝑛+1𝑥∮𝐶(cosh(𝑧𝑠)/(sinh𝑧−sinh𝑥)𝑛+1𝑑𝑧,𝑠2=−𝜆, is associated with differential equation 𝑑2𝑦(𝑥)/𝑑𝑥2+(𝜆+𝑛(𝑛+1)/cosh2𝑥)𝑦(𝑥)=0. …”
    Get full text
    Article
  6. 86
  7. 87

    Integration and Application of Information and Energy Technologies in Computing Power Integrated Energy Systems by ZHANG Tian, GAO Jianwei, LIU Haoyu, LIU Jiangtao, TAN Qinliang

    Published 2025-02-01
    Subjects: “…computing power integrated energy systems (cpies)|information and energy technologies|artificial intelligence|big data analytics|internet of things…”
    Get full text
    Article
  8. 88

    Integrable and Superintegrable Systems with Higher Order Integrals of Motion: Master Function Formalism by Z. Alizadeh, H. Panahi

    Published 2018-01-01
    “…We construct two-dimensional integrable and superintegrable systems in terms of the master function formalism and relate them to Mielnik’s and Marquette’s construction in supersymmetric quantum mechanics. …”
    Get full text
    Article
  9. 89
  10. 90

    Integrable 2D Time-Irreversible Systems with a Cubic Second Integral by H. M. Yehia, A. A. Elmandouh

    Published 2016-01-01
    “…We construct a very rare integrable 2D mechanical system which admits a complementary integral of motion cubic in the velocities in the presence of conservative potential and velocity-dependent (gyroscopic) forces. …”
    Get full text
    Article
  11. 91
  12. 92
  13. 93
  14. 94
  15. 95
  16. 96
  17. 97

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article
  18. 98

    STUDY ON THE EFFECT OF ROLLING STRENGTHENING ON THE SURFACE INTEGRITY OF 45 STEEL THREAD ROOT by WANG Dong, LU XinXi, ZHAO JingWen, LIN HongXu, ZHANG Meng

    Published 2022-01-01
    “…The effect of rolling strengthening parameters on the surface integrity of thread root was investigated by single factor test. …”
    Get full text
    Article
  19. 99

    Integrity Design for Networked Control Systems with Actuator Failures and Data Packet Dropouts by Xiaomei Qi, Jason Gu

    Published 2013-01-01
    “…The integrity design problem of fault tolerant control for networked control system (NCS) with actuator failures and data packet dropouts is investigated. …”
    Get full text
    Article
  20. 100

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…This research presents a method to enforce compulsory attribution as a countermeasure to enhance the integrity of best-answer digital assignments. The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
    Get full text
    Article