Showing 1,841 - 1,860 results of 14,255 for search '"containment"', query time: 0.07s Refine Results
  1. 1841

    RESEARCH ON DYNAMICS CHARACTERISTICS OF GEAR-BEARING COUPLING IN FAULTY TRANSMISSION SYSTEM by CAO JinXin

    Published 2020-01-01
    “…The results show that the established dynamic model can well describe the dynamic characteristics of the fault-containing gear transmission system. In the time domain waveform diagram,a periodic shock signal is generated due to the presence of a crack fault,and a sideband is generated around the meshing frequency in the spectrogram.…”
    Get full text
    Article
  2. 1842

    Dataset on the questionnaire-based survey of the readiness of government accountants to implement international public sector accounting standards (IPSAS)Mendeley Data by Moawiah Awad Alghizzawi

    Published 2025-04-01
    “…Section A addresses the demographic attributes of the respondents. Section B contains 2 parts; part (1) measures human resource, part (2) measures information technology. …”
    Get full text
    Article
  3. 1843

    Network threat situation assessment based on unsupervised multi-source data feature analysis by Hongyu YANG, Fengyan WANG

    Published 2020-02-01
    “…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
    Get full text
    Article
  4. 1844

    Comparative study on the synthesis of magnetic ferrite adsorbent for the removal of Cd(II) from wastewater by Fang Liu, Kanggen Zhou, Quanzhou Chen, Aihe Wang, Wei Chen

    Published 2018-10-01
    “…Based on the cost analysis, the magnetic ferrite was a cost-effective adsorbent for Cd-containing wastewater treatment.…”
    Get full text
    Article
  5. 1845

    Vehicle Detection Based on Multifeature Extraction and Recognition Adopting RBF Neural Network on ADAS System by Xuewen Chen, Huaqing Chen, Huan Xu

    Published 2020-01-01
    “…A region of interest (ROI) that may contain vehicles is extracted based on the composite features on vehicle’s bottom shadow and taillights by setting a gray threshold on vehicle shadow region and a series of constraints on taillights. …”
    Get full text
    Article
  6. 1846

    Concretization of Integral Reality Theory with the Video Assistant Referee System: Analysis of The Football Competitions of Metropolitan Municipality Erzurumspor, One of The Sporto... by Ülhak Çimen

    Published 2020-09-01
    “…This study aims to contribute to a better understanding of integral reality which contains abstract discourses with video assistant referee system which contains concrete perspectives. …”
    Get full text
    Article
  7. 1847

    Identification of Poison Ivy, Poison Oak, Poison Sumac, and Poisonwood by Sydney Park Brown, Joe Sewards, Patricia Grace, Sherrie Lowe

    Published 2012-03-01
    “…Even the smoke from burning plants contains oil particles that can be inhaled and cause lung irritation. …”
    Get full text
    Article
  8. 1848

    Hiperrealitas dalam Permainan Video Daring: Simulasi, Simulakra, dan Hiperrealitas Garena Free Fire by Anak Agung Ngurah Agung Suryadipta Wardhana

    Published 2022-03-01
    “…Hyperreality can be seen from the war simulations contained in the course of the game, the weapons used, the selected characters that players can use, to the virtual world that becomes the battle arena. …”
    Get full text
    Article
  9. 1849

    Experimental and Numerical Study of Strength and Failure Behavior of Precracked Marble under True Triaxial Compression by Yong Han, Yuemao Zhao, Jinglong Li

    Published 2021-01-01
    “…The numerical results show that the crack initiation and coalescence are observed and characterized from the inner and outer tips of preexisting cracks in specimens containing single crack and multiple parallel cracks. …”
    Get full text
    Article
  10. 1850

    Sulfurous Gases As Biological Messengers and Toxins: Comparative Genetics of Their Metabolism in Model Organisms by Neal D. Mathew, David I. Schlipalius, Paul R. Ebert

    Published 2011-01-01
    “…In fact, the pathways for the metabolism of sulfur containing gases in lower organisms have not yet been described. …”
    Get full text
    Article
  11. 1851

    Leakage Detection in Water Pipes: An Approach of Smart Water by Dmitriy Vladislav

    Published 2023-03-01
    “…This system is containing basic components like sensors, GSM module, Arduino. …”
    Get full text
    Article
  12. 1852

    Comparisons between Hygroscopic Measurements and UNIFAC Model Predictions for Dicarboxylic Organic Aerosol Mixtures by Jae Young Lee, Lynn M. Hildemann

    Published 2013-01-01
    “…Hygroscopic behavior was measured at 12°C over aqueous bulk solutions containing dicarboxylic acids, using a Baratron pressure transducer. …”
    Get full text
    Article
  13. 1853

    Digital watermarking method based on context word prediction and window compression coding by Lingyun XIANG, Minghao HUANG, Chenling ZHANG, Chunfang YANG

    Published 2024-02-01
    “…To address the problems of limited number of substitutable words and low watermark extraction efficiency in the existing natural language digital watermarking methods, a creative method based on context word prediction and window compression coding was proposed.Firstly, the contextual semantic features of each word in the original text were automatically learned through a neural network language model, and then the candidate word set for each word was predicted, thus the number of substitutable words that could be utilized for carrying watermark information was expanded.Meanwhile, considering the difference of the semantic impact caused by the substitutions of candidate words at different positions, the watermark information was embedded into each window containing several words, and the selection of candidate words for watermark embedding was optimized by the similarity between sentences before and after performing word substitutions.Finally, a semantic-independent window compression coding method was proposed, which encoded each window as appointed watermark information in terms of the character information of words contained in the window.So that during watermark extraction, the dependence on the original context at the position of word substitution was eliminated.The experimental results show that the proposed method greatly improves the watermark extraction efficiency with high embedding capacity and text quality.…”
    Get full text
    Article
  14. 1854

    Visual Rhetoric of the Jewel with The Infant Jesus in the Setting of Arma Christi by Ewa Letkiewicz

    Published 2024-12-01
    “…Reflections on the jewel aimed to provide information about the functions and meanings attached to it, to recognize the means contained in the peculiar iconographic message, and to consider the potential effects it could have had. …”
    Get full text
    Article
  15. 1855

    Propaganda Politik Hoaks dalam Pemilihan Presiden Tahun 2019 by Rahman Tahir, Heri Kusmanto, Muryanto Amin

    Published 2020-05-01
    “…The results showed that the purpose of hoaks political propaganda in addition to influencing the public was also done to change the negative image into positive or vice versa, in order to increase the electability and popularity of the candidates supported. material or content that is used as propaganda hoaks is material or content that contains SARA, personal, uses a pattern of nicknames, transfers, lure, popular narrative by using news / information content which is negative in nature and even sometimes contains lies using hoax propaganda patterns that are used in the 2019 presidential election. …”
    Get full text
    Article
  16. 1856

    Use of Hydrophilic Insoluble Polymers in the Restoration of Metal-Contaminated Soils by Guiwei Qu, Amarilis de Varennes

    Published 2009-01-01
    “…In contaminated soils, hydrophilic insoluble polymers can create microcosms that are rich in water and nutrients (counterions) but only contain small concentrations of toxic elements; the conditions of these microenvironments are favorable to roots and microorganisms. …”
    Get full text
    Article
  17. 1857

    Investigation into effective mechanical properties of porous material produced by the additive manufacturing method by Seyed Mohammad Javad Tabatabaee, Mahdi Fakoor

    Published 2023-07-01
    “…Porous materials are defined as materials that contain holes, voids, or spaces in their structures, which can be interconnected or isolated. …”
    Get full text
    Article
  18. 1858

    On ∼n Notion of Conjugacy in Some Classes of Epigroups by Aftab Hussain Shah, Amal S. Alali, Mohd Rafiq Parray

    Published 2024-01-01
    “…The challenge to introduce a new notion of conjugacy in semigroups is to choose the suitable set of conjugating elements. A semigroup may contain a zero, and if zero lies in the conjugating set, then the relation reduces to the universal relation as can be seen in the notions ∼l, ∼p, and ∼o. …”
    Get full text
    Article
  19. 1859

    Compound Fault Feature Extraction of Gearbox with Improved Dual-tree Complex Wavelet Transform by Meitao Ye, Huili Chai

    Published 2019-09-01
    “…The obtained sub-bands are subjected to frequency removal, the sub-band FFT is used to determine the main frequency and its notch filtering is performed to ensure that the frequency aliasing is eliminated, so that each sub-band only contains a unique characteristic frequency. Then using the proposed method and the methods such as Variational Mode Decomposition, the noise-containing simulation signals are decomposed and compared to verify the feasibility of the proposed method. …”
    Get full text
    Article
  20. 1860

    A Critique on the Book Descartes to Leibniz: A History of Philosophy by Abdurrazzaq Hesamifar

    Published 2022-01-01
    “…The important advantages of the book are having the educative form and containing the main ideas of any one of those philosophers. …”
    Get full text
    Article