Showing 281 - 300 results of 408 for search '"interception"', query time: 0.10s Refine Results
  1. 281

    Integrated hydrothermal evolution of a Botucatu paleodune and a blanketing lava flow from the Serra Geral Group, Uruguaiana by Leo Afraneo Hartmann, Felipe Padilha Leitzke, Cassiana Roberta Lizzoni Michelin, Melissa Johner, Cristiano de Carvalho Lana

    Published 2025-02-01
    “…The strongly altered volcanic zircon preserved in the reddened Catalán Flow yields a concordia-intercept age of 137.3 ±7.6 Ma. Complex processes are thus constrained in the evolution of the Botucatu Formation and the first Serra Geral lava flow.…”
    Get full text
    Article
  2. 282
  3. 283

    Numerical Simulation of Dynamic Characteristics of Dam Concrete Based on Fuzzy Set by Fang Jianyin, Liu Ke, Dang Faning, Li Shutian

    Published 2021-01-01
    “…Based on the definition of integrity, integrity area, and intercepted sections in the quantitative zoning theory, the concrete CT images were divided into the hole or crack area (P0−λ1), hardened cement stone area (Pλ1−λ2), and aggregate area (Pλ2−1). …”
    Get full text
    Article
  4. 284

    Starting then stopping: a nationwide register-based study on the magnitude, predictors, and urban-rural patterns of under-vaccination variation across health centers in The Gambia by Alieu Sowe, Fredinah Namatovu, Bai Cham, Per E. Gustafsson

    Published 2024-12-01
    “…We cross tabulated under-vaccination status across study variables and fitted two-level random intercept multilevel logistic regression models to measure variance, contribution to the variance, and factors associated with the variance and under-vaccination. …”
    Get full text
    Article
  5. 285

    Controls of lithology and climate over chemical weathering trends: new insights from the precipitation-dominated Dokriani glacier, central Himalaya, India by Shipika Sundriyal, Tanuj Shukla, Shichang Kang, Yulan Zhang, Dwarika Prasad Dobhal, Rajesh Singh

    Published 2024-01-01
    “…We observed a clear control of carbonic acid-mediated reactions in the early ablation periods, while sulfuric acid-mediated reactions dominate in peak and late ablation periods. The slopes and intercepts in best-fit regressions of [*Ca2+ + *Mg2+ vs *SO42− and HCO3−] and [HCO3− vs *SO42−] in meltwater were following the stoichiometric parameters of sulfide oxidation coupled to carbonate dissolution reactions. …”
    Get full text
    Article
  6. 286

    Hikikomori, a risk factor for life-threatening malnutrition: a case report of an emergency within the vulnerability by Nicola Artusi, Emanuele Russo, Gianmaria Valeri, Marzia Tecchiolli, Franco Cominotto

    Published 2025-02-01
    “…The  Emergency  Department  necessitates  a  more  integrated  approach  with  social  and  out-of-hospital  health services  for  intercepting  and  addressing  the  needs  of  vulnerable  individuals. …”
    Get full text
    Article
  7. 287

    Quantitative Determination of 18-β-Glycyrrhetinic Acid in HepG2 Cell Line by High Performance Liquid Chromatography Method by Giuseppina Nocca, Cinzia Callà, Stefano Angelo Santini, Adriana Amalfitano, Luca Marigo, Diana Valeria Rossetti, Gianrico Spagnuolo, Massimo Cordaro

    Published 2018-01-01
    “…The LOD and LOQ were determined based on standard deviation of the y-intercept and the slope of the calibration curve. The LOD and LOQ values were found to be 11.46 μg/mL and 34.72 μg/mL, respectively. …”
    Get full text
    Article
  8. 288

    A Comparison between Atlantic Canadian and National Correction Equations to Improve the Accuracy of Self-Reported Obesity Estimates in Atlantic Canada by Cynthia L. Murray, Gordon W. Walsh, Sarah Connor Gorber

    Published 2012-01-01
    “…Using separate multiple regression models for men and women, self-reported body mass index (BMI) was corrected by multiplying the self-reported estimate by its corresponding model coefficient and adding the model intercept. Paired t-tests were used to determine whether corrected mean BMI values were significantly more accurate (i.e., closer to measured data) than the equivalent means based on self-reported data. …”
    Get full text
    Article
  9. 289

    Psychometric comparison of two short versions of the Perceived Stress Scale (PSS-4) in a representative sample of the German population by Bjarne Schmalbach, Mareike Ernst, Mareike Ernst, Elmar Brähler, Elmar Brähler, Katja Petrowski

    Published 2025-01-01
    “…Specifically, the original PSS-4 by Cohen et al. suffers from response style effects, which we remedied using random intercept factor analysis. With the addition of the method factor, it is a highly reliable and valid scale. …”
    Get full text
    Article
  10. 290

    MalAware: A tabletop exercise for malware security awareness education and incident response training by Giddeon Angafor, Iryna Yevseyeva, Leandros Maglaras

    Published 2024-01-01
    “…Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. …”
    Get full text
    Article
  11. 291

    Reservoir connectivity in deep-water turbidite deposits over geological and production time scales: an integrated study of the Shwe field, Bay of Bengal by Han-Gwi Lim, Changwon Lee

    Published 2024-10-01
    “…From a geological perspective, the results indicate that: (1) multiple water intercepts at a single gas gradient imply the presence of a connected reservoir with non-producible perched waters; (2) compensational stacking leads to extensive overlaps between lobe element layers, enhancing lateral reservoir connectivity through a high net-to-gross ratio (avg. 82%; max. 100%) and multiple amalgamated sand-sand contacts; and (3) sand injectites act as conduits between vertically separated reservoirs, contributing to gas production. …”
    Get full text
    Article
  12. 292

    A Review Study on the Main Sources of Porosity in Al-Si Cast Alloys by Agnes Samuel, Yasser Zedan, Herbert Doty, Victor Songmene, Fawzy. H. Samuel

    Published 2021-01-01
    “…Intermetallics precipitate in the form of intercepted platelets which restricts the flow of the molten metal, leading to formation of shrinkage cavities. …”
    Get full text
    Article
  13. 293

    Cerium(III)-Selective Membrane Electrode Based on Dibenzo-24-crown-8 as a Neutral Carrier by Susheel K. Mittal, S. K. Ashok Kumar, Harish K. Sharma

    Published 2010-01-01
    “…The internal solution concentration does not have a significant effect on the response of the electrode except for a change in intercept of the calibration curves. The working pH range for Ce(III) solutions (1x10-2 M and 1x10-3 M) is 3.5-8.0. …”
    Get full text
    Article
  14. 294

    Application of Image Recognition Algorithm Based on Partial Differential Equation and Wavelet Transform in the Intelligent Linkage System of Government Urban Public Management by Xinyu Xu

    Published 2021-01-01
    “…Due to the limitations of research ability and objective conditions, this article intercepts the “cross-section” of the big linkage mechanism in a certain street to demonstrate it and analyzes this “cross-section” more thoroughly. …”
    Get full text
    Article
  15. 295

    Monitoring Cortical and Neuromuscular Activity: Six-month Insights into Knee Joint Position Sense Following ACL Reconstruction by Aglaja Busch, Lorena R. R. Gianotti, Frank Mayer, Heiner Baur

    Published 2024-11-01
    “…Linear mixed models were performed with group (ACL or controls), the measurement time point, and respective limb as fixed effect and each grouping per subject combination as random effect with random intercept. # Results Significantly higher beta-2 power over the frontal region of interest was observed at the first measurement time point in the non-involved limb of the ACL group in comparison to the control group (p = 0.03). …”
    Get full text
    Article
  16. 296

    An Overview of Composite Standard Elastic-Net Distribution Based on Complex Wavelet Coefficients by Tahani A. Aloafi, Hassan M. Aljohani

    Published 2022-01-01
    “…On the other hand, some methods depend on the slope, and the intercept is recommended. These methods can be described as thresholding rules. …”
    Get full text
    Article
  17. 297

    Generation and verification method of trusted signature seal incorporating handwriting features by Li LI, Shang GAO, Peiliang ZUO, Jiazheng XUAN, Han SONG

    Published 2024-02-01
    “…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
    Get full text
    Article
  18. 298

    Extensions to Mean–Geometric Mean Linking by Alexander Robitzsch

    Published 2024-12-01
    “…Additionally, a simulation study demonstrates that defining MGM linking based on item intercepts rather than item difficulties leads to more accurate linking parameter estimates. …”
    Get full text
    Article
  19. 299

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  20. 300

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. …”
    Get full text
    Article