Showing 3,721 - 3,740 results of 99,603 for search '"analysis"', query time: 0.17s Refine Results
  1. 3721
  2. 3722

    POST SOVIET COUNTRIES’ FOREIGN TRADE ANALYSIS: GRAVITY METHOD by N. Chernov

    Published 2017-06-01
    “…In the article the foreign trade analysis of post soviet countries such as Kazakhstan and Ukraine based on gravity model is presented. …”
    Get full text
    Article
  3. 3723
  4. 3724

    Colour analysis of children's drawings of gods using computer vision by Mátyás Turós

    Published 2025-01-01
    Subjects: “…Drawing analysis…”
    Get full text
    Article
  5. 3725
  6. 3726

    Quality assessment of spent laying hens and analysis of influencing factors by Runzhe Wang, Jiahui Lai, Guiyun Xu, Chuanwei Zheng, Zhiqiong Mao, Jiangxia Zheng

    Published 2025-01-01
    “…The results of the correlation analysis showed that there was no significant relationship between the bone health status and dislocation in laying hens. …”
    Get full text
    Article
  7. 3727
  8. 3728

    Integrated analysis of proteomics and metabolomics in infantile epileptic spasms syndrome by Jun Chen, Xiaoqian Wang, Xueyi Rao, Huan Luo, Yajun Shen, Jing Gan

    Published 2025-02-01
    “…Metabolomic analysis suggests that linoleic acid is a highly noteworthy differential metabolite in the cerebrospinal fluid of IESS patients. …”
    Get full text
    Article
  9. 3729
  10. 3730

    Analysis and improvement of an identity-based signature scheme from lattices by ANGChun-li Y, ANJian-hua Y, HENGShi-hui Z, ANGLi-cheng W, ANGYu Y

    Published 2015-05-01
    “…Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove the strong unforgeability under selective identity and adaptive chosen-message attacks.Then,using Boyen signing technique (PKC 2010) inpoves the signing algorithm,and proves the strong unforgeability under selective identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model.In addition,it com-pares the efficiency and security of the scheme and the other identity-based signatures from lattices.…”
    Get full text
    Article
  11. 3731
  12. 3732

    Analysis of Nuclear Explosion Detection Capability of IMS Hydroacoustic Network by Yan Wang, Wei Tang, Zhehan Liu, Jian Li, Xiaoming Wang, Shiya Zou

    Published 2024-01-01
    “…Findings indicate the network’s proficiency in identifying long-distance propagation signals, particularly those with high explosion source levels within the sound fixing and ranging (SOFAR) channel. The sensitivity analysis demonstrates the network’s ability to detect explosions smaller than 1 kg equivalent in close proximity to a station, and larger explosions exceeding 1 kg or 1 ton at greater distances. …”
    Get full text
    Article
  13. 3733
  14. 3734

    Nucleus Disc Replacement: Design and Material Selection FEA Analysis by Amparo Vanaclocha, Vicente Vanaclocha, Carlos M. Atienza, Pablo Clavel, Pablo Jorda-Gomez, Carlos Barrios, Nieves Saiz-Sapena, Leyre Vanaclocha

    Published 2022-01-01
    “…We selected the materials and implant design and performed Finite Element Analysis (FEA) studies. Background. Nucleus disc replacements, implanted since 1960, have undergone continuous evolution in materials and designs, but subsidence, extrusion, and in vivo degradation limit widespread use. …”
    Get full text
    Article
  15. 3735

    Analysis and Motion Modeling of Bionic Auxiliary Device for Ankle Rehabilitation by Wang Liangwen, Li Quntao, Wang Xinjie, Mu Xiaoqi, Xie Guizhong, Du Wenliao

    Published 2016-01-01
    “…A process of this research can be as a reference for mechanism analysis of more motion models.…”
    Get full text
    Article
  16. 3736
  17. 3737

    Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System by Xintao Li, Tongshun Cheng, Zaisheng Zhang, Li Zhao

    Published 2022-01-01
    “…An equilibrium strategic analysis is then presented using an evolutionary game model in which the strategic behavioral choices of government, enterprises, and citizens are investigated by embedding political costs in the environmental governance system. …”
    Get full text
    Article
  18. 3738

    Keystroke features recognition based on stable linear discriminant analysis by Wei-guo SHEN, Wei WANG

    Published 2017-11-01
    Subjects: “…stable linear discriminant analysis…”
    Get full text
    Article
  19. 3739
  20. 3740