Showing 601 - 620 results of 48,647 for search '"Mechanic"', query time: 0.17s Refine Results
  1. 601
  2. 602

    Strains, Mechanism, and Perspective: Salmonella-Based Cancer Therapy by Cheng-Zhi Wang, Robert A. Kazmierczak, Abraham Eisenstark

    Published 2016-01-01
    “…However, basic questions about the mechanisms of bacterial-mediated tumor targeting and destruction are still being elucidated. …”
    Get full text
    Article
  3. 603
  4. 604

    Mechanism of Mongolian Medicine Batri-7 on Salmonella Enteritis by Yang D, Chen S, Borijihan H, Aoqier A, Sarula S, Siqin S, Manda M, Temuqile T, Baigude H

    Published 2025-02-01
    “…Through this study, we discovered the mechanism of BT-7’s dual action on the host and pathogenic bacteria. …”
    Get full text
    Article
  5. 605

    MECHANICAL ANALYSIS OF THE DRILL BIT IN THE DUAL CASING SIDETRACKING by KONG ChunYan, LIANG Zheng, ZHANG DeRong

    Published 2016-01-01
    “…Further reference the theory of metal cutting mechanics,researched cutting force and cutting torque of the drill bit in sidetracking the process,checked the sidetracking bit strength,provided technical advice to prevent the drill bit holded in and stuck fracture accident occurred in the dual casing sidetracking process. …”
    Get full text
    Article
  6. 606
  7. 607

    Citrus Mechanical Harvesting Systems--Continuous Canopy Shakers by Fritz M. Roka, Reza J. Ehsani, Stephen H. Futch, Barbara R. Hyman

    Published 2014-09-01
    “… Mechanization has been the hallmark of American agriculture. …”
    Get full text
    Article
  8. 608
  9. 609
  10. 610
  11. 611

    Mitochondrial diseases: from molecular mechanisms to therapeutic advances by Haipeng Wen, Hui Deng, Bingyan Li, Junyu Chen, Junye Zhu, Xian Zhang, Shigeo Yoshida, Yedi Zhou

    Published 2025-01-01
    “…They possess various metabolic and quality control mechanisms crucial for maintaining normal cellular activities. …”
    Get full text
    Article
  12. 612

    Traditional guidance mechanism based deep robust watermarking by Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG

    Published 2023-04-01
    “…With the development of network and multimedia technology, multimedia data has gradually become a key source of information for people, making digital media the primary battlefield for copyright protection and anti-counterfeit traceability.Digital watermarking techniques have been widely studied and recognized as important tools for copyright protection.However, the robustness of conventional digital watermarking methods is limited as sensitive digital media can easily be affected by noise and external interference during transmission.Then the existing powerful digital watermarking technology’s comprehensive resistance to all forms of attacks must be enhanced.Moreover, the conventional robust digital watermarking algorithm’s generalizability across a variety of image types is limited due to its embedding method.Deep learning has been widely used in the development of robust digital watermarking systems due to its self-learning abilities.However, current initialization techniques based on deep neural networks rely on random parameters and features, resulting in low-quality model generation, lengthy training times, and potential convergence issues.To address these challenges, a deep robust digital watermarking algorithm based on a traditional bootstrapping mechanism was proposed.It combined the benefits of both traditional digital watermarking techniques and deep neural networks, taking into account their learning abilities and robust characteristics.The algorithm used the classic robust digital watermarking algorithm to make watermarked photos, and the constructed feature guaranteed the resilience of traditional watermarked images.The final dense image was produced by fusing the conventionally watermarked image with the deep network using the U-Net structure.The testing results demonstrate that the technique can increase the stego image’s resistance to various attacks and provide superior visual quality compared to the conventional algorithm.…”
    Get full text
    Article
  13. 613
  14. 614

    Review on Meshing Theory of the Planetary Roller Screw Mechanism by Liu Geng, Fu Xiaojun, Ma Shangjun, Tong Ruiting

    Published 2015-01-01
    “…The planetary roller screw mechanism( PRSM) has high load carrying capacity,high transmission accuracy and high reliability in harsh environment. …”
    Get full text
    Article
  15. 615

    THE MECHANISM OF HARDENING OF ALLOYED STEELS IN IMPULSE MAGNETIC FIELD by A. V. Alifanov, Zh. A. Popova, N. M. Tsionenko

    Published 2012-11-01
    “…In this paper, a model describing the mechanism of hardening steels in a pulsed magnetic field is provided. …”
    Get full text
    Article
  16. 616

    Defense and Security Mechanisms in the Internet of Things: A Review by Sabina Szymoniak, Jacek Piątkowski, Mirosław Kurkowski

    Published 2025-01-01
    “…To overcome this, the following survey aims to critically review existing security mechanisms in IoT environments and significantly fill these gaps. …”
    Get full text
    Article
  17. 617
  18. 618

    Experimental Study of the Creep Effect on the Mechanical Properties of Concrete by Zainab Kammouna, Matthieu Briffaut, Yann Malecot

    Published 2019-01-01
    “…Hence, the most important conclusion of this study is that the effect of creep on mechanical properties of concrete strongly depends on both loading age and loading direction.…”
    Get full text
    Article
  19. 619

    Wage Effect and Workers’ Skill Mismatch: Paths and Mechanisms by Xin Zhao, Dan Wu, Lijin Wang

    Published 2025-02-01
    “…This study investigated the internal relation between skill mismatches and wages, including the influencing processes and mechanisms. Findings showed that excessive vertical mismatches and horizontal skill mismatches result in wage losses for workers. …”
    Get full text
    Article
  20. 620

    HDFS-oriented cryptographic key resource control mechanism by Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG

    Published 2022-09-01
    “…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
    Get full text
    Article