Showing 48,741 - 48,760 results of 63,767 for search '"The Times"', query time: 0.21s Refine Results
  1. 48741

    ENERGY EFFICIENCY AND ASSESSMENT METHODS OF TECHNOLOGICAL SYSTEMS OF WATER SUPPLY AND WATER DISPOSAL by A. A. Kapansky

    Published 2016-09-01
    “…These factors include the technical condition of the equipment and piping systems, alterations in the modes of operation of pumping units over time, a significant impact of the ambient temperature on the power consumption, amount of precipitation and the chemical composition of the effluent. …”
    Get full text
    Article
  2. 48742

    From Fields to Microclimate: Assessing the Influence of Agricultural Landscape Structure on Vegetation Cover and Local Climate in Central Europe by Jan Kuntzman, Jakub Brom

    Published 2024-12-01
    “…In contrast, the distribution of values on the Austrian side was more even, likely due to the greater diversity of cultivated crops, a more spatially diverse landscape, and a balanced spread of agricultural activities over time. In light of climate change and biodiversity conservation, these results emphasize the need to protect and restore landscape complexity to enhance resilience and environmental stability.…”
    Get full text
    Article
  3. 48743

    Use of the task-based approach to strengthen writing fluency in the English language by Tamara Carpio Afonso, Jesús Alberto González Valero, Mallelin Bonachea Rodríguez, Ignacia Rodríguez Estevés

    Published 2022-07-01
    “…<br /><strong>Results</strong>: the application of different methods and techniques corroborated that the health professionals presented difficulties in fluency in writing; they spent too much time reviewing ideas; in addition to incurring in unnecessary repetitions, poor syntactic elaboration and writing of short sentences. …”
    Get full text
    Article
  4. 48744

    The Influence of the Migration of the Governor’s Subjects from Kalmyk Khanate to China on the Kalmyk Settlements of Orenburg Province in 1771 by Stepan V. Dzhundzhuzov

    Published 2024-12-01
    “…Most archival documents are being introduced into scientific circulation for the first time. The restoration of the outline of the events under consideration through the use of archival materials required the use of special methods of historical research: critical analysis of historical sources, historical continuity, as well as historical-comparative and historical-legal methods that allow tracing common and distinct features in the legal situation of Kalmyk villagers in Orenburg province. …”
    Get full text
    Article
  5. 48745

    A Gestalt perspective on Manichaean worldviews and individuals’ engagement in violence: the case of the Italian far left by Giulia Grillo, Giulia Grillo

    Published 2025-01-01
    “…Far-left and far-right ideologies strongly influenced Italian socio-political movements of the time. Thus, this paper explores whether Manichaean perspectives informing far-left militants’ decision to resort to violence originated from far-left ideologies or whether they existed independently of these ideologies. …”
    Get full text
    Article
  6. 48746

    The Frequency of Intestinal Parasitic Infections in COVID-19 Patients: A Case-Control Study in Tehran, Capital of Iran by Ali Taghipour, Majid Pirestani, Ramin Hamidi Farahani, Mohammad Barati

    Published 2023-01-01
    “…RNA extraction was performed, and then real time reverse-transcription polymerase chain reaction (rRT-PCR) assay was applied to detect viral RNA. …”
    Get full text
    Article
  7. 48747

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the &quot;cloud-edge-end&quot; three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  8. 48748

    The Contemporary System of German Economic Diplomacy by R. O. Raynkhardt

    Published 2015-06-01
    “…The author provides a brief summary of historical and economic background, stages and conditions of its development from the 1950-s to present time. He casts light upon the procedures and mechanisms of interaction between the key national economic-diplomatic agents i.e. ministries, agencies, other authorized bodies, public and private institutes outlining their usage of concrete economic, administrative and legal instruments in the course of respective policy measures. …”
    Get full text
    Article
  9. 48749

    Inversion-Based Face Swapping With Diffusion Model by Daehyun Yoo, Hongchul Lee, Jiho Kim

    Published 2025-01-01
    “…Furthermore, the proposed InFS achieved effective face swapping results without requiring additional guidance and reduces inference time by approximately 6.96 seconds compared to previous diffusion-based approaches.…”
    Get full text
    Article
  10. 48750

    Propofol-Based Sedation Does Not Increase Rate of Complication during Percutaneous Endoscopic Gastrostomy Procedure by Somchai Amornyotin, Wiyada Chalayonnavin, Siriporn Kongphlay

    Published 2011-01-01
    “…There were no significant differences in patients' characteristics, sedation time, indication, complications, anesthetic personnel and mortality rate between the two groups. …”
    Get full text
    Article
  11. 48751

    Design of Meteorological Element Detection Platform for Atmospheric Boundary Layer Based on UAV by Yonghong Zhang, Tiantian Dong, Yunping Liu

    Published 2017-01-01
    “…Thirdly, data management of the collected data was conducted, including local storage and real-time display on ground host computer. Finally, combined with the comprehensive analysis of the data of automatic weather station, the validity of the data was verified. …”
    Get full text
    Article
  12. 48752

    ‘Fission Chips’: An Activist’s View on Anti-Nuclear Activism in South Africa from the 1980s to the 21st Century by Mike Kantey

    Published 2024-10-01
    “…What we consider far more important to grasp is that ‘State Capture’ is not an entirely new phenomenon since what we call the ‘Putsch of Polokwane’ in 2007. From the time of General Jan Smuts to PW Botha, from Mandela to Zuma, the insidious relationship among international arms dealers, globe-trotting Mafiosi, and beneficiaries of the military-industrial global nexus, has remained a constant refrain: only names and places have been changed. …”
    Get full text
    Article
  13. 48753

    Linking the Historical Sample of the Netherlands with the USA Censuses, 1850–1940 by Diogo Paiva, Francisco Anguita, Kees Mandemakers

    Published 2020-09-01
    “…We also evaluated the result in the light of what we know from emigration patterns to the USA over time and period and we concluded that our efforts have produced a reasonable result. …”
    Get full text
    Article
  14. 48754

    A machine learning based classifier for topological quantum materials by Ashiqur Rasul, Md Shafayat Hossain, Ankan Ghosh Dastider, Himaddri Roy, M. Zahid Hasan, Quazi D. M. Khosru

    Published 2024-12-01
    “…A major bottleneck in this field is the computational resources and time complexity related to finding new materials from ab initio calculations. …”
    Get full text
    Article
  15. 48755

    The Effects of Mother-Plant Irrigation Schedule on the Quality Of Tomato (<i>Lycopersicum esculentum</i>) Seed by H Ibrahim, AS Gudugi, JA Oladiran, AJ Odofiin, MKA Adeboye, GO Oyetunde

    Published 2013-07-01
    “…There was no consistent superiority of one irrigation interval over the other in respect of seed longevity over time. A general increase in seedling height and number of leaves per seedling was recorded as storage period progressed before a decline sets in at different ages. …”
    Get full text
    Article
  16. 48756

    Cosimulation of Power and Temperature Models at the SystemC/TLM for a Soft-Core Processor by Zineb El Hariti, Abdelhakim Alali, Mohamed Sadik, Kaoutar Aamali

    Published 2020-01-01
    “…To address this challenge, designing at the system level is the suitable measure to tackle with the complexity of the Systems on Chip, aiming at having better adjustment between timing and accuracy for power and temperature estimations. …”
    Get full text
    Article
  17. 48757

    A Practical Approach for Predicting Power in a Small-Scale Off-Grid Photovoltaic System using Machine Learning Algorithms by Aadyasha Patel, O. V. Gnana Swathika, Umashankar Subramaniam, T. Sudhakar Babu, Alok Tripathi, Samriddha Nag, Alagar Karthick, M. Muhibbullah

    Published 2022-01-01
    “…Further, a website is developed wherein the user can key in the date and time. The output of that transaction is predicted temperature, humidity, and forecasted power generation of the specific standalone photovoltaic system. …”
    Get full text
    Article
  18. 48758

    Transformed Calculation Models in Practice of Dynamic Analysis of Fixed Offshore Platform Structures by Valerii I. Sutyrin, Elvira R. Kuzhakhmetova

    Published 2024-12-01
    “…Modal analysis using a transformed calculation model (TCM) provides a significant reduction in the order and total computational time of the mechanical system. The possibility of analyzing dynamic reactions by a direct method based on the accelerogram of a real earthquake is provided.…”
    Get full text
    Article
  19. 48759

    RESEARCH ON THE DESIGN METHOD OF THE AEROSPACE STANDARD THIN-WALLED SPECIMEN TO MEASURE THE PRECISION OF MACHINE TOOL by JIANG XiaoHui, ZHANG ZhenYa, LI HaoLin, YAO Yao

    Published 2017-01-01
    “…Based on the results of finite element analysis,it’s the first time to put forward the processing complexity coefficient concept,compares the cutting force and thermal load,the cutting force dominates in the residual stress generated,this paper only consider the effect of cutting force,to evaluate the characteristics of the"X"shape aviation thin-wall specimen in the geometric model and mechanical structure design in-depth. …”
    Get full text
    Article
  20. 48760

    Simulation and Impact Analysis of Flooding Caused by the Break of a Concrete-face Rockfill Dam by ZHAN Mingqiang, GUO Yurong, YANG Yanlong, CHEN Bo

    Published 2022-01-01
    “…Simulation and impact analysis of flooding caused by the break of water reservoir dams is a research priority in the field of prevention and mitigation of disasters surrounding water conservancy projects.To study the scope of submergence and the influencing degree in the downstream areas caused by the break of a concrete-face rockfill dam,by analyzing the characteristics of the concrete-face rockfill dam break,this paper built a one-dimensional unsteady hydrodynamic model of the area from the concrete-face rockfill dam to the hydroelectric power plant reservoir in the downstream.Then,with an actual concrete-face rockfill dam project as a research case,the flood flow distribution under various failure modes of the selected dam case was simulated.The peak flow rate,highest flood level,and the corresponding emergence time of typical sections along the watercourse under the dam were obtained.The results show that the dam-break duration,the final size of the breach,and the water level in front of the dam before the break are the three major factors influencing the simulation calculations with this hydrodynamic model.Shorter duration of dam break,a larger final size of the breach,and a higher water level in front of the dam before the break will lead to a larger peak flow at the dam site.Also,in various dam-break conditions,a large proportion of the major villages and towns on both sides of the downstream flow are expected to be completely submerged.These findings may offer reliable scientific references for the formulation of emergency response and rescue protocols as well as disaster severity evaluation associated with flooding caused by the break of presently active concrete-face rockfill dams.…”
    Get full text
    Article