Showing 1,741 - 1,760 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 1741

    Design and Study of Walking Mechanism of Deformable Wheel-legged Robot by Jianhua Zhai, Fuxiao Wu, Xiaohua Wei, Haidong Luo

    Published 2021-01-01
    “…The working principle of the wheel with variable structure is introduced. The mechanism executes wheeled mode on the flat road, and walks in wheel mode when encountering obstacles, it switches to a petals-type mode to cross obstacles. …”
    Get full text
    Article
  2. 1742

    EXPLORING CHRISTIAN LEADERSHIP IN PARACHURCH ORGANISATIONS IN LESOTHO by J.M. Morenammele, W.J. Schoeman

    Published 2020-12-01
    “…A qualitative methodology was used that involved interviews with ten chief executive officers and ten focus-group interviews from ten parachurch institutions based in the Maseru district, Lesotho. …”
    Get full text
    Article
  3. 1743

    Multiobjective Optimization Method for Energy-Saving Design of Green Buildings by Yuanting Yang, Fengxiang Lu, Lan Qing

    Published 2024-01-01
    “…A multiobjective evolutionary optimization algorithm and its execution method are proposed for building energy efficiency, which integrates EnergyPlus. …”
    Get full text
    Article
  4. 1744

    RASP based Web security detection method by Hang YU, Shuai WANG, Huamin JIN

    Published 2020-11-01
    “…At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web application security protection.Based on the in-depth analysis of the risk of traditional data flow monitoring methods,combined with the technical characteristics of rasp,a Web security detection method based on rasp was proposed.The rasp probe was embedded in the parameters of authority discrimination function,system command execution function and database operation function in Web application,and the change of data flow was detected in real-time at the code interpreter level.This method was implemented based on Java language.It was proved in the laboratory that this method is better than the traditional Web security detection method in accuracy and detection time.Finally,the deployment and application scenarios of this method were analyzed and proposed.…”
    Get full text
    Article
  5. 1745

    Protocol to detect neutral lipids with BODIPY staining in myeloid-derived suppressor cells in mouse mammary tumors by Ukjin Kim, Rumela Chakrabarti

    Published 2025-03-01
    “…Furthermore, we introduce alternative protocols with MDSC sorting to overcome risk of cell death by BODIPY.For complete details on the use and execution of this protocol, please refer to Kim et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  6. 1746

    In situ measurements of carbonation rate with air permeability for the development of a proposal for a classification of exposure to carbonation. by Luis Ebensperger M., Mario Olivares O.

    Published 2023-11-01
    “…The ingress of carbon dioxide CO2 into concrete is an issue that, unfortunately, does not have sufficient precedents at the national level for the execution of the Residual Service Life analysis of concrete structures. …”
    Get full text
    Article
  7. 1747

    Research on asynchronous robust federated learning method in vehicle computing power network by YIN Hongbo, WANG Shuai, ZHANG Ke, ZHANG Yin

    Published 2024-12-01
    “…To address the above issues, an asynchronous robust federated learning method was proposed, which achieves vehicle data privacy protection while improving the efficiency of model collaborative training through asynchronous execution of federated learning processes between vehicles. …”
    Get full text
    Article
  8. 1748

    Pedagogical professional improvement and the ability formación to search for information by Sandra Williams Serrano, Luis Alberto Mass Sosa, José Aurelio Díaz Quiñones, Yudith Brito Pérez de Corcho, Ania Bernal Consuegra

    Published 2022-07-01
    “…Actions are suggested to work on the formation of the aforementioned skill, based on workshops that address the essentials for its operationalization through the contents that are taught; and tax the execution of student research. The search for information not only provides tools for the development of research, but also constitutes an instrument to promote logical thinking skills, with a high impact when the student, independently, faces larger tasks, for which it is suggested develop a system of workshops for teacher preparation.…”
    Get full text
    Article
  9. 1749

    Low-Complexity Online Synthesis for AMIDAR Processors by Stefan Döbrich, Christian Hochberger

    Published 2010-01-01
    “…Thus, we believe that online synthesis that takes place during the execution of an application is one way to broaden the applicability of reconfigurable architectures. …”
    Get full text
    Article
  10. 1750

    Database energy saving strategy using blockchain and Internet of Things by Dexian Yang, Jiong Yu, Zhenzhen He, Ping Li

    Published 2025-01-01
    “…The findings demonstrate that increasing the number of network nodes in the database system within a reasonable range can reduce the overall execution time. Additionally, as time progresses, the query traffic of the system database continues to increase. …”
    Get full text
    Article
  11. 1751

    Recent Developments on Operator-Difference Schemes for Solving Nonlocal BVPs for the Wave Equation by Mehmet Emir Koksal

    Published 2011-01-01
    “…These schemes are shown to be absolutely stable, and the numerical results are presented to compare the accuracy and the execution times. It is naturally seen that the second-order difference schemes are much more advantages than the first-order ones. …”
    Get full text
    Article
  12. 1752

    Optimization and Simulation of a Reasonable Scheduling Model under Multiple Tasks in Company Management by Zhuo Wang

    Published 2020-01-01
    “…Through the analysis of relevant simulation experiments, it can be concluded that the task scheduling algorithm proposed in this paper can not only allocate the corresponding resources for high-priority tasks effectively, but also can save the cost, so as to show better execution efficiency.…”
    Get full text
    Article
  13. 1753

    Perceived Development of Sustainable Agriculture by Maja Klun, Renata Slabe Erker

    Published 2012-06-01
    “…In order to provide assistance in the shaping, execution and assessment of sustainable activities, in this article we analyse the attitude of the public and farmers towards sustainable development in agriculture. …”
    Get full text
    Article
  14. 1754

    Fertility Preservation in Female Patients with Cancer Part II: Royan Institute Clinical Practice Guideline for Girls and Women with Cancer; A Review Study by Azar Yahyaei, Esmat Mashhadi Meighani, Firouzeh Ghaffari

    Published 2025-01-01
    “…The formulation and execution of harmonized guidelines and policies concerning the provision of FPservices, inclusive of therapeutic strategies and standardization of procedures, are crucial to surmount disagreementsregarding the delivery of these therapeutic services and avert delays in cancer treatment. …”
    Get full text
    Article
  15. 1755

    Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking by Wenjie Zhong, Jian‐tao Zhou, Tao Sun

    Published 2023-02-01
    “…By the principle that the execution details of property‐unchecked, non‐interactive, and unrelated statements do not affect the model checking results, we model coarse‐grained model fragments for such statements, while fine‐grained model fragments for property‐checked, interactive, and related statements. …”
    Get full text
    Article
  16. 1756

    Protocol for transcriptomic and epigenomic analyses of tip-like endothelial cells using scRNA-seq and ChIP-seq by Shintaro Funasaki, Yuri Miyamura, Shunsuke Kamei, Akhinur Rahman, Masaya Yamazaki, Shingo Usuki, Keiichiro Yasunaga, Yorifumi Satou, Hiroto Ohguchi, Takashi Minami

    Published 2025-03-01
    “…This scalable protocol is also applicable to diverse omics studies, including proteomics and metabolomics.For complete details on the use and execution of this protocol, please refer to Miyamura et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  17. 1757

    Methodological Criticism of the Book of Theater History in the Safavid Period by Majid Sarsangi, Sadeq Rashidi, Farhad Amini

    Published 2020-08-01
    “…In the same way, using the theory of performance, some of the species mentioned in this work have been examined as executive types, and their strengths and weaknesses have been expressed. …”
    Get full text
    Article
  18. 1758

    Choreography-driven business process management framework based on blockchain by Dongjin YU, Yijie WEI, Xiaoxiao SUN, Ke NI, Hujun SHEN

    Published 2021-09-01
    “…Aiming at the problems of high process instantiation cost and difficult version iteration in the current blockchain-based business process management systems, a choreography-driven blockchain business process management framework was proposed.The framework included a general smart contract that could be used to store business process choreography meta-models, model component evolution versions, and instance execution status.The cost of process model instantiation on the blockchain was significantly reduced by delaying model elements instantiation timing and integrating multiple process instances.At the same time, a version control method based on model data reuse and voting mechanism was introduced, so that process instances of different versions of orchestration models could be created in a single smart contract.A real case validates the effectiveness of the framework in distributed business process management.…”
    Get full text
    Article
  19. 1759

    Protocol for the generation of HLF+ HOXA+ human hematopoietic progenitor cells from pluripotent stem cells by Sherry Li Zheng, Jonas L. Fowler, Julie Y. Chen, Christopher Li, Elaine Lin, Alana T. Nguyen, Angela Chen, George Q. Daley, Lay Teng Ang, Kyle M. Loh

    Published 2025-03-01
    “…This 10-day protocol enables the manufacturing of blood and immune cells in monolayer cultures.For complete details on the use and execution of this protocol, please refer to Fowler and Zheng et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  20. 1760

    Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes by Ammar S. Alanazi, Noor Munir, Majid Khan, Muhammad Asif, Iqtadar Hussain

    Published 2021-01-01
    “…The proposed attacks are successfully performed to retrieve the key with very little execution time by using just one chosen image which indicates the vulnerability of multiple chaotic S-boxes-based cryptosystems. …”
    Get full text
    Article