Showing 3,441 - 3,460 results of 34,905 for search '"The Various"', query time: 0.16s Refine Results
  1. 3441

    Optimal Printing and Post-Processing Modes of Polymer Products Manufactured Using SLA-Technology of Additive Мanufacturing by T. A. Pratasenia, A. P. Kren

    Published 2023-12-01
    “…At the initial stage of introducing of new production methods into various industries, the most studied and widely used control methods are usually used. …”
    Get full text
    Article
  2. 3442

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG

    Published 2022-04-01
    “…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
    Get full text
    Article
  3. 3443

    Detection of Cancer Stem Cells from Patient Samples by Sofia Hakala, Anna Hämäläinen, Sanne Sandelin, Nikolaos Giannareas, Elisa Närvä

    Published 2025-01-01
    “…The existence of cancer stem cells (CSCs) in various tumors has become increasingly clear in addition to their prominent role in therapy resistance, metastasis, and recurrence. …”
    Get full text
    Article
  4. 3444

    A Corticobasal Syndrome Variant of Familial Creutzfeldt-Jakob Disease with Stroke-Like Onset by Ján Necpál, Martin Stelzer, Silvia Koščová, Michal Patarák

    Published 2016-01-01
    “…Creutzfeldt-Jakob disease (CJD) is an untreatable rare human prion disease characterized by rapidly progressive dementia along with various neurological features, including myoclonus and sometimes other movement disorders. …”
    Get full text
    Article
  5. 3445

    Antidiabetic Medicinal Plants Used by the Basotho Tribe of Eastern Free State: A Review by Fatai Oladunni Balogun, Natu Thomas Tshabalala, Anofi Omotayo Tom Ashafa

    Published 2016-01-01
    “…The present study attempted to update the various scientific evidence on the twenty-three (23) plants originating from different parts of the world but widely used by the Sotho people in the management of DM. …”
    Get full text
    Article
  6. 3446

    A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods by Guangchun Luo, Ningduo Peng, Ke Qin, Aiguo Chen

    Published 2014-01-01
    “…Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. …”
    Get full text
    Article
  7. 3447

    MRM-BERT: a novel deep neural network predictor of multiple RNA modifications by fusing BERT representation and sequence features by Linshu Wang, Yuan Zhou

    Published 2024-12-01
    “…RNA modifications play crucial roles in various biological processes and diseases. Accurate prediction of RNA modification sites is essential for understanding their functions. …”
    Get full text
    Article
  8. 3448

    Numerical Investigation of Hydraulic Fracture Propagation in Naturally Fractured Reservoirs Based on Lattice Spring Model by Kaikai Zhao, Pengfei Jiang, Yanjun Feng, Xiaodong Sun, Lixing Cheng, Jianwei Zheng

    Published 2020-01-01
    “…The geometry of the hydraulic fracture network (HFN) may have implications for the optimization of hydraulic fracturing operations. Various parameters, including the in situ stress, treatment parameters (injection rate and fluid viscosity), and orientation of natural fractures (NFs), can significantly affect the interactions between hydraulic fracture (HF) and NFs and the final HFN. …”
    Get full text
    Article
  9. 3449

    Charles Bonnet syndrome in patients with geographic atrophy secondary to age-related macular degeneration: a cross-sectional study by Nathalie Skovgaard Eriksen, Nabi Mousavi, Yousif Subhi, Torben Lykke Sørensen, Marie Krogh Nielsen

    Published 2025-01-01
    “…Characteristics of the visual hallucinations were reported to occur at various frequencies from daily to less than monthly, occur during various times of the day, and almost always last minutes at most. …”
    Get full text
    Article
  10. 3450

    RISK RANKING OF OPEN-END INVESTMENT FUNDS IN THE REPUBLIC OF CROATIA by Ivana Srdarević, Ivan Kristek

    Published 2017-11-01
    “…Both individuals and business entities are exposed to various types of risk on a daily basis. Since business conducts in contemporary market conditions are characterized by an increasingly higher level of insecurity, business entities have acknowledged the value of risk management. …”
    Get full text
    Article
  11. 3451

    Approximate Solutions, Thermal Properties, and Superstatistics Solutions to Schrödinger Equation by Ituen Okon, Clement Onate, Ekwevugbe Omugbe, Uduakobong Okorie, Akaninyene Antia, Michael Onyeaju, Chen Wen-Li, Judith Araujo

    Published 2022-01-01
    “…Using the resulting energy equation and with the help of Matlab software, the numerical bound state solutions were obtained for various values of the screening parameter (α) as well as different expectation values via Hellmann-Feynman Theorem (HFT). …”
    Get full text
    Article
  12. 3452

    Implementation of the pancasila student profile strengthening project on sustainable lifestyle themes by Tri Agus Tiyani, Zaka Hadikusuma Ramadan

    Published 2024-08-01
    “…Qualitative research is carried out by utilizing various methodologies currently available in nature with the aim of interpreting the phenomena seen. …”
    Get full text
    Article
  13. 3453

    Establishment of a Shear Strength Prediction Model for Asphalt Mixtures with Raw Materials Properties and Design Parameters by Bangwei Wu, Xing Wu, Liping Liu, Peng Xiao

    Published 2021-01-01
    “…Thus, a shear strength prediction model considering the effects of various factors is proposed to guide the design of asphalt mixes. …”
    Get full text
    Article
  14. 3454

    The Effect of Silver Nanoparticles Stabilized with Tannic Acid for Nano-Priming on Zea mays L. Seeds Germination by Windri Handayani, Richard Owen Tanadi, Aminah Umar

    Published 2024-11-01
    “…Silver nanoparticles (AgNPs) have various benefits for application in the agricultural sector, such as nano-seed priming to enhance seedling growth and development. …”
    Get full text
    Article
  15. 3455

    COVID-19 vaccination: Knowledge and perception of beneficiaries at a tertiary care center in Haryana, India by Garima Sangwan, Nitika Sharma, Rajesh Garg

    Published 2025-02-01
    “…Various barriers leading to vaccine hesitancy and facilitators for a vaccination program should be identified and addressed for the successful implementation of the program. …”
    Get full text
    Article
  16. 3456

    INVESTIGATION ON THE DYNAMICS OF MOVEMENT OF CYLINDRICAL CLEANING PIGS THROUGH THE BENDS OF PIPELINE SYSTEMS FOR FLUID TRANSPORTATION by Serhii STETSIUK, Yaroslav DOROSHENKO, Robert BONDARENKO, Oleksandr FІLIPCHUK, Volodymyr VOLOVETSKYI

    Published 2024-06-01
    “…The dynamics of the movement of one-piece cylindrical cleaning pistons made of various materials (silicone compound, self-destructive elastic polymer composition, polyurethane foam assembly foam) in the pipelines of pipeline systems intended for fluid transportation were studied by modelling and experimentally. …”
    Get full text
    Article
  17. 3457

    Książka w środowisku lokalnym i regionalnym by Jacek Wojciechowski

    Published 2007-01-01
    “…The local space and, partly, the regional one always shapes the reception, whereas the transmission, though to a various degree depending on a given form of communication, generates itself mainly in the global and/or all-national dimensions. …”
    Get full text
    Article
  18. 3458

    Peculiar index relations, 2D TQFT, and universality of SUSY enhancement by Matthew Buican, Linfeng Li, Takahiro Nishinaka

    Published 2020-01-01
    “…By writing these quantities in the language of 2D topological quantum field theory (TQFT), we easily read off the S-duality action on the flavor symmetries of the AD quivers and also find expressions for the Schur indices of various classes of exotic AD theories appearing in different decoupling limits. …”
    Get full text
    Article
  19. 3459

    Optical Coherence Tomography (Angiography) Biomarkers in the Assessment and Monitoring of Diabetic Macular Edema by Corina-Iuliana Suciu, Vlad-Ioan Suciu, Simona-Delia Nicoara

    Published 2020-01-01
    “…Significant progress has been made in recent years in optical coherence tomography and angiography technology. At the same time, various parameters have been attributed the role of biomarkers creating the frame for new monitoring and treatment strategies and offering new insights into the pathogenesis of diabetic retinopathy and diabetic macular edema. …”
    Get full text
    Article
  20. 3460

    Heteroaryl-Fused Triazapentalenes: Synthesis and Aggregation-Induced Emission by Yingchun Wang, Thanh Chung Pham, Jianjun Huang, Junfeng Wu, Wim Dehaen

    Published 2025-01-01
    “…Interestingly, modified Suzuki cross-couplings with various boronic acids resulted in poor to moderate yields of <b>HetATAPs 2</b>–<b>5</b> which were arylated at the azole moiety. …”
    Get full text
    Article