Showing 541 - 560 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 541

    Generalised versus Regional Odontodysplasia: Diagnosis, Transitional Management, and Long-Term Followup—A Report of 2 Cases by Mostafa Ibrahim Mostafa, Nehad Samir Taha, Mennat Allah Ismail Mehrez

    Published 2013-01-01
    “…A 2-step, conservative treatment plan was executed with a 10-year followup. Step 1 was root canal treatment of nonvital teeth. …”
    Get full text
    Article
  2. 542

    DC algorithm for estimation of sparse Gaussian graphical models. by Tomokaze Shiratori, Yuichi Takano

    Published 2024-01-01
    “…To solve this problem efficiently, we design a DC algorithm in which the graphical lasso algorithm is repeatedly executed to solve convex optimization subproblems. …”
    Get full text
    Article
  3. 543

    Ambiguous Territory by Kathy Velikov, Cathryn Dwyre, Chris Perry, David Salomon

    Published 2018-11-01
    “…What can one do when the things and processes used to sustain oneself – physically, economically, emotionally – are executed at a scale and intensity whereby they become poisonous? …”
    Get full text
    Article
  4. 544

    Afghan EFL lecturers’ beliefs about autonomous language learning by Hashmatullah Tareen

    Published 2025-12-01
    “…Thematic analysis of the data was executed utilizing techniques of data reduction, data display, and the drawing and verification of conclusions. …”
    Get full text
    Article
  5. 545

    Evolutionary Prediction of Soil Loss from Observed Rainstorm Parameters in an Erosion Watershed Using Genetic Programming by Kennedy C. Onyelowe, Ahmed M. Ebid, Light Nwobia

    Published 2021-01-01
    “…Three evolutionary trials were executed, and three models were presented considering different permutations of the predictors. …”
    Get full text
    Article
  6. 546

    An Entropy-Based Multiobjective Evolutionary Algorithm with an Enhanced Elite Mechanism by Yufang Qin, Junzhong Ji, Chunnian Liu

    Published 2012-01-01
    “…The proposed algorithm is executed on widely used test problems, and the simulated results show that the algorithm has better or comparative performances in convergence and diversity of solutions compared with two state-of-the-art evolutionary algorithms: NSGA-II, SPEA2 and the MOSADE.…”
    Get full text
    Article
  7. 547

    Cyber Attacks on Commercial Drones: A Review by Bruno Branco, Jose Silvestre Serra Silva, Miguel Correia

    Published 2025-01-01
    “…The main purpose is to provide an overview of the possible ways in which cyber attacks can be executed. This analysis concludes that drones, designed for diverse purposes, are vulnerable to a range of cyber attacks. …”
    Get full text
    Article
  8. 548

    Current Controlled AC/DC Converter and Its Performance—A Mathematical Model by Jan Iwaszkiewicz, Piotr Mysiak, Adam Muc

    Published 2025-01-01
    “…Several examples of current, voltage, and vectors taken during the simulation and experimental works are executed.…”
    Get full text
    Article
  9. 549

    Bridging Photonics and Optoelectronics Curriculum for the Solar Photovoltaic and LED Industries by Yu-Shan Su, Han-Chao Chang

    Published 2014-01-01
    “…Finally in order to bridge the gap between learning and practical application, the study provides an idea on curriculum design and suggests that curriculum review should be executed by industrial experts to confirm the courses related to the employability.…”
    Get full text
    Article
  10. 550

    For Loan Processing a Fuzzy Process Mining by İbrahim Ethem Yazıcı, Orhan Engin

    Published 2023-09-01
    “…Then, the new workflow is designed and the pattern is executed. In the first stage of the total loan period, 7.84 hours of earnings are obtained. …”
    Get full text
    Article
  11. 551

    Implementation Model Prototyping In Application Design of Halal Food Product Detection For Overseas Muslim Students by Fandisya Rahman, Bambang Minto Basuki

    Published 2023-11-01
    “…The use of Kotlin, which is statically expressed and executed, makes the process of developing these applications efficient and straightforward. …”
    Get full text
    Article
  12. 552

    Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture by Xuejiao LIU, Tiancong CAO, Yingjie XIA

    Published 2023-03-01
    “…To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was proposed.A blockchain was maintained by trusted authorities of different trust domains.A modified ciphertext-policy attribute-based encryption scheme was adopted to encrypt data, and encrypted data was stored in interplanetary file system (IPFS) with relevant information recorded on the blockchain, constructing a fine-grained and secure cross-domain data sharing scheme based on blockchain.A verification algorithm for cross-domain access based on the garbled Bloom filter was designed, and a smart contract executed fast decryption tests based on access policies on the blockchain, improving the access efficiency of a mass of ciphertext.A cross-domain data access method based on outsourcing decryption was designed, and the trusted authorities transformed ciphertexts while performing outsourcing decryption with complex bilinear pairing calculations, reducing the time overhead of vehicle decryption.Experiment results show that the proposed scheme is superior to other schemes in the process of cross-domain ciphertext transformation and vehicle decryption, and the cross-domain data access efficiency is increased by 60% on average.…”
    Get full text
    Article
  13. 553

    Optimizing Circuit Reusing and its Application in Randomized Benchmarking by Zhuo Chen, Guoding Liu, Xiongfeng Ma

    Published 2025-01-01
    “…An efficient approach known as ``circuit reusing,'' where each circuit is executed multiple times, reduces the cost compared to implementing new circuits. …”
    Get full text
    Article
  14. 554

    Methods and Models for Metabolic Assessment in Mice by G. Pacini, B. Omar, B. Ahrén

    Published 2013-01-01
    “…This report summarizes how these tests can be executed and how arising data are analyzed to confidently determine changes in insulin resistance and insulin secretion with high reproducibility. …”
    Get full text
    Article
  15. 555

    The COVID-19 pandemic art of Anna Szpakowska-Kujawska: from pastels to spatial compositions by Karolina Tomczak

    Published 2025-02-01
    “…These works include a series of pastels Kwadraty zaokienne (Squares outside the Window, or “pandemic squares”) from 2020 and spatial objects made of polystyrene foam and cardboard executed in the years 2021–2022. Tomczak gives an analytical interpretation of the modernist element in Szpakowska-Kujawska’s artistic record of her experience of the plague as it developed from painting at the point of realistic departure to unconventional sculpture. …”
    Get full text
    Article
  16. 556

    Volumetric Denoising of XCT Data Using Quantum Computing by Thomas Lang, Anja Heim, Anastasia Papadaki, Kilian Dremel, Dimitri Prjamkov, Martin Blaimer, Markus Firsching, Stefan Kasperl, Theobald O.J. Fuchs

    Published 2025-02-01
    “…The final implementation is executed on a real X-ray computed tomography dataset, showing that proper denoising can be performed on quantum devices, yet current technological limitations inhibit the application to large datasets. …”
    Get full text
    Article
  17. 557

    Yoyo trick on type‐II generalised Feistel networks by Tao Hou, Ting Cui

    Published 2021-11-01
    “…For 7‐round type‐II GFNs, this work presents the first decomposition thus far, which can be executed within a time complexity of O(n24n + 3) and a data complexity of O(23n + 2). …”
    Get full text
    Article
  18. 558

    Delayed occluder displacement following patent ductus arteriosus closure successfully managed with thoracic endovascular aortic repair: a case report and literature review by Dihao Pan, Anfeng Yu, Chengcheng Li, Liangwei Chen, Chengyao Ni, Haige Zhao

    Published 2025-01-01
    “…Despite numerous unsuccessful catheter-based interventions, thoracic endovascular aortic repair (TEVAR) was successfully executed. This procedure effectively resolved the PDA without any postprocedural complications. …”
    Get full text
    Article
  19. 559

    National Defense as fiscal policy during the Mauricio Macri administration (2015-2019) by Sergio Gabriel Eissa

    Published 2020-09-01
    “…This article argues that the Defense policies implemented by the Mauricio Macri administration (2015-2019) were subordinated to the priorities defined by the neo-liberal fiscal adjustment programs executed during its tenure. In order to show this, the discourse of major policy makers is surveyed, the main policy documents published during the period are examined, and finally, the resources actually allocated to carry out Defense policies are tallied. …”
    Get full text
    Article
  20. 560

    Image vaccine against steganography in encrypted domain by Xinran Li, Zichi Wang

    Published 2025-02-01
    “…When steganography is executed on vaccinated image, the utilization of steganography can be discovered in encrypted domain. …”
    Get full text
    Article