Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
101
Reliability Analysis of Random Fuzzy Unrepairable Systems
Published 2014-01-01“…The lifetimes of components in unrepairable systems are considered as random fuzzy variables since randomness and fuzziness are often merged with each other. …”
Get full text
Article -
102
On the normal approximation for weakly dependent random variables
Published 2005-12-01Subjects: Get full text
Article -
103
Modelling random antibody adsorption and immunoassay activity
Published 2016-07-01Subjects: “…random sequential adsorption…”
Get full text
Article -
104
Function Spaces with a Random Variable Exponent
Published 2011-01-01“…The spaces with a random variable exponent 𝐿𝑝(𝜔)(𝐷×Ω) and 𝑊𝑘,𝑝(𝜔)(𝐷×Ω) are introduced. …”
Get full text
Article -
105
Certificateless signature scheme without random oracles
Published 2015-04-01“…The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure against key replacement attack.In order to solve this problem,a new certificateless signature scheme in the standard model had constructed.Based on the NGBDH and Many-DH assumption,the scheme was proved secure against existentially unforgeable under adaptive chosen message attack.In addition,the proposed scheme enjoys less computation cost and lower communication bandwidth and can resist against key replacement attack.…”
Get full text
Article -
106
Comparison of the Wiener and Kirchhoff Indices of Random Pentachains
Published 2021-01-01“…Based on these formulae, we then make comparisons between the expected values of the Wiener index and the Kirchhoff index in random pentachains and present the average values of the Wiener and Kirchhoff indices with respect to the set of all random pentachains with n pentagons.…”
Get full text
Article -
107
The Stability of Nonlinear Differential Systems with Random Parameters
Published 2012-01-01“…The paper deals with nonlinear differential systems with random parameters in a general form. A new method for construction of the Lyapunov functions is proposed and is used to obtain sufficient conditions for L2-stability of the trivial solution of the considered systems.…”
Get full text
Article -
108
RANDOM VIBRATION FATIGUE ANALYSIS FOR AN AIRBORNE MODULE
Published 2019-01-01Subjects: “…Random vibration…”
Get full text
Article -
109
-
110
A Decomposed-Ensemble Prediction Framework for Gate-In Operations at Container Terminals
Published 2024-12-01Subjects: Get full text
Article -
111
Effectiveness and Safety of Treatments for Early‐Stage Merkel Cell Carcinoma: A Systematic Review and Meta‐Analysis of Randomized and Non‐Randomized Studies
Published 2025-01-01“…Methods A systematic review and meta‐analysis of randomized and non‐randomized studies published between January 01, 1972, and January 31, 2023, and having overall survival (OS), local recurrence (LR), regional recurrence (RR), disease‐specific survival (DSS), and/or disease‐free survival (DFS) as outcomes was conducted using the Cochrane Central Register of Controlled Trials (CENTRAL), PubMed (NCBI), Scopus (ELSEVIER), and Web of Science (CLAVIRATE) databases. …”
Get full text
Article -
112
A Systematic Overview of Fuzzy-Random Option Pricing in Discrete Time and Fuzzy-Random Binomial Extension Sensitive Interest Rate Pricing
Published 2025-01-01Subjects: Get full text
Article -
113
-
114
The Maximal Length of 2-Path in Random Critical Graphs
Published 2018-01-01“…Consider the Erdős-Rényi random graph G(n,M) built with n vertices and M edges uniformly randomly chosen from the set of n2 edges. …”
Get full text
Article -
115
Kidney damage on fertility and pregnancy: A Mendelian randomization.
Published 2023-01-01“…Hence, this study aimed to investigate the causal effect of kidney damage on fertility and pregnancy using Mendelian randomization (MR).<h4>Methods</h4>We first used two-sample MR to examine the effects of kidney damage on fertility and pregnancy. …”
Get full text
Article -
116
Predicting Metabolic Syndrome Using the Random Forest Method
Published 2015-01-01“…This study proposes a computational method for determining the prevalence of metabolic syndrome (MS) and to predict its occurrence using the National Cholesterol Education Program Adult Treatment Panel III (NCEP ATP III) criteria. The Random Forest (RF) method is also applied to identify significant health parameters. …”
Get full text
Article -
117
Random Vibration of Space Shuttle Weather Protection Systems
Published 1995-01-01“…The article deals with random vibrations of the space shuttle weather protection systems. …”
Get full text
Article -
118
Method of dynamic random network coding in DTN environment
Published 2014-02-01Subjects: Get full text
Article -
119
Iterative estimation method for random interleaver of Turbo codes
Published 2015-06-01Subjects: Get full text
Article -
120
Simple power analysis attack on random pseudo operations
Published 2012-05-01Subjects: Get full text
Article