Showing 37,741 - 37,760 results of 72,708 for search '"system"', query time: 0.27s Refine Results
  1. 37741

    Blastomycosis of the scrotum: Not a fun guy by Duncan Petrik, Dylan Hoare, Megan MacGillivray, Daniel Ricciuto

    Published 2025-01-01
    “…These can include genitourinary system infections which may manifest as ulcerative, draining skin lesions. …”
    Get full text
    Article
  2. 37742

    Differential privacy protection technology and its application in big data environment by Yu FU, Yihan YU, Xiaoping WU

    Published 2019-10-01
    “…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
    Get full text
    Article
  3. 37743

    Flow Measurements and Flow Analysis in the Exit Region of a Radial Turbine by D. M. Murugan, W. Tabakoff, A. Hamed

    Published 1997-01-01
    “…Three-dimensional flow measurements using LDV system were obtained in the exit region of a radial inflow turbine at an off-design operating condition. …”
    Get full text
    Article
  4. 37744

    RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations by Dror Y. Kenett, Yoash Shapira, Eshel Ben-Jacob

    Published 2009-01-01
    “…Our results show that in comparison to the raw correlations, the affinity matrices highlight the dominant factors of the system, and the partial correlation matrices contain more information. …”
    Get full text
    Article
  5. 37745

    Global stability of a network-based SIS epidemic model with a general nonlinear incidence rate by Shouying Huang, Jifa Jiang

    Published 2016-04-01
    “…Furthermore, by applying an iteration scheme and the theory of cooperative system respectively, we obtain sufficient conditions under which the endemic equilibrium is globally asymptotically stable. …”
    Get full text
    Article
  6. 37746

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. …”
    Get full text
    Article
  7. 37747

    Toward a Model for Marking up Non-SI Units and Measurements by Naoki Kokaze, Kiyonori Nagasaki, Makoto Gotō, Yuta Hashimoto, A. Charles Muller, Masahiro Shimoda

    Published 2019-06-01
    “…All of these elements and attributes will be included in the TEI P5 Guidelines, and they are especially useful when encoding units that are not based on the decimal system. Though this paper offers example encodings based on a Japanese historical source, the Engi-Shiki, this model is also applicable to the markup of units used for measurement within various cultural spheres other than Japan.…”
    Get full text
    Article
  8. 37748

    COVID-19: Malaysia's fight against this deadly virus by Ke-Yan Loo, Vengadesh Letchumanan

    Published 2021-06-01
    “…A record toll of new cases and fatalities for consecutive weeks has pushed Malaysia's total cases to a soaring 500,000 confirmed cases with 2300 deaths – the third highest in Southeast Asia behind Indonesia and the Philippines. The healthcare system in Malaysia is currently under heavy pressure to control the disease as the number of confirmed cases is rising exponentially. …”
    Get full text
    Article
  9. 37749

    Study on Cumulative Damage Law of Stainless Steel-Reinforced Concrete Columns under Step Impact Loading by Bo Wu, Shixiang Xu, Guoxue Zhang

    Published 2019-01-01
    “…In this study, an ultrahigh drop hammer impact test system was adopted for multiple horizontal impact tests on stainless steel-reinforced concrete columns and ordinary-reinforced concrete columns with the same longitudinal reinforcement diameter. …”
    Get full text
    Article
  10. 37750

    Lessons from Cancer Immunoediting in Cutaneous Melanoma by Mariana Aris, María Marcela Barrio, José Mordoh

    Published 2012-01-01
    “…We will revisit the dual role of the immune system in controlling and enabling tumor progression, known as cancer immunoediting. …”
    Get full text
    Article
  11. 37751

    Traffic Accident Prediction Based on LSTM-GBRT Model by Zhihao Zhang, Wenzhong Yang, Silamu Wushour

    Published 2020-01-01
    “…In order to provide traffic management departments with more accurate forecast data, it can be applied in the traffic management system to help make scientific decisions. This paper establishes a traffic accident prediction model based on LSTM-GBRT (long short-term memory, gradient boosted regression trees) and predicts traffic accident safety level indicators by training traffic accident-related data. …”
    Get full text
    Article
  12. 37752

    Three-Dimensional Seepage Field Inversion Analysis and Seepage Control Effect Evaluation of Shuidishan Reservoir by PAN Yingjie, XU Jianjun, XIE Xinghua, LU Bin, ZHANG Yu, XIE Dongyi

    Published 2022-01-01
    “…Moderate permeable joint zones occur at the right dam abutment of the Shuidishan reservoir,which indicates a risk of seepage damage at the right dam abutment and its downstream.To reasonably evaluate the effect of reservoir seepage control measures,we build an overall three-dimensional (3D) seepage model to simulate the stable seepage in a natural state and the operation period.The permeability coefficient of the rock layer is optimized,and the seepage field characteristics of the reservoir area are analyzed.The results show that the downstream uplift pressure of the dam foundation is significantly reduced under the combined effect of the water-blocking curtain and the depressurization of drainage holes.Moreover,the curtain grouting lowers the local groundwater level within the right dam abutment,which inhibits the leakage of the joint zones to a certain extent.The overall seepage discharge of the reservoir is relatively small,which indicates that the layout of the water prevention and drainage system of the current project is acceptable,and thus the leakage of the joint zones at the right dam-abutment is effectively prevented.…”
    Get full text
    Article
  13. 37753

    Research and construction of new digital foundation for the fusion between IPv6 and 5G by LIN Chujian, JIAO Baochen, LIANG Zhelong, ZHU Yue, ZHAO Xing, LI Tao

    Published 2024-11-01
    “…Based on the current situation of the campus network of Nankai University, new generation information network technologies such as IPv6 and 5G were studied, a new basic network integrating Wi-Fi campus network and 5G private network based on IPv6 protocol, IPv6 adaptation and application pilot deployment of the information innovation platform was built, a new digital foundation integrating IPv6 and 5G for plug and play against IPv6 was carried out and constructed, a mature cloud network fusion solution for the deployment of smart campus business system and a new basic network environment and trusted computing resources for the training, technology research and innovation of professionals in the next generation Internet related disciplines were provided, and the digital transformation of university education was enabled.…”
    Get full text
    Article
  14. 37754

    Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA

    Published 2014-11-01
    “…There is no doubt that mobile payment is the spotlight in Internet finance now.Although users can enjoy quick and convenient services,they have to face with more severe security problems at the same time:the attack incidents,such as cellphone Trojan and privacy leaks emerge endlessly.Lots of viruses which are designed for attacking financial payments can steal users’ personal information including account,password and verification code in the proceedings of remote payment and near field communication.Security issues have already seriously impeded the further development of the mobile payment market.To solve the above problems,discusses the security issues in mobile terminals,payments,network and interactive logic of banking business from financial institutions’ perspective was discussed systematically.In addition,current status of relevant security key technologies are summarized from academic research community and industry fields.Finally,based on related research achievements,the design of system architecture and suggestions for mobile payment security are proposed,which can guide the future development of commercial bank.…”
    Get full text
    Article
  15. 37755

    Finite-Time Control for Attitude Tracking Maneuver of Rigid Satellite by Mingyi Huo, Xing Huo, Hamid Reza Karimi, Jianfei Ni

    Published 2014-01-01
    “…It is proved that the closed-loop attitude tracking system is finite-time stable. The tracking errors of the attitude and the angular velocity are asymptotically stabilized. …”
    Get full text
    Article
  16. 37756
  17. 37757

    BASIS ETIKA LINGKUNGAN HIDUP MASYARAKAT TRADISIONAL MADURA by Hasani Utsman

    Published 2018-06-01
    “…The Maduranese's traditional society belief system to nature seems more syncretic than the tradition of the people in Java Island.…”
    Get full text
    Article
  18. 37758

    Cognitive flexibility and sociality in Guinea baboons (Papio papio). by Julie Gullstrand, Nicolas Claidière, Joël Fagot

    Published 2024-01-01
    “…The dominance rank and social network were inferred from their free access to the computer test system on which the cognitive task was presented. …”
    Get full text
    Article
  19. 37759

    Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid by Yiying Zhang, Suxiang Zhang, Yuemin Ding

    Published 2016-01-01
    “…And the sensing and communication device must be after equal parameter simulation environment under strict evaluation and verification can be put to use in actual production operation system. In this paper, we analyze the application of wireless sensor network in smart grid and propose the test method of the interaction between WSN and smart grid.…”
    Get full text
    Article
  20. 37760

    Behaviors and Numerical Simulations of Malaria Dynamic Models with Transgenic Mosquitoes by Xiongwei Liu, Junjun Xu, Xiao Wang, Lizhi Cheng

    Published 2014-01-01
    “…This paper investigates two methods of releasing transgenic mosquitoes and proposes two epidemic models involving malaria patients, anopheles, wild mosquitoes, and transgenic mosquitoes based on system of continuous differential equations. A basic reproduction number R0 is defined for the models and it serves as a threshold parameter that predicts whether malaria will spread. …”
    Get full text
    Article