Showing 38,921 - 38,940 results of 72,708 for search '"system"', query time: 0.26s Refine Results
  1. 38921

    A Fully Coupled Time-Domain BEM-FEM Method for the Prediction of Symmetric Hydroelastic Responses of Ships with Forward Speed by Tushar Kanti Show, Spyros Hirdaris, Ranadev Datta

    Published 2022-01-01
    “…A transient time-domain free surface Green function is used for the idealisation of the seakeeping problem using an Earth fixed coordinate system. Free surface ship hydrodynamics are idealised in the time domain by a Green function, and forward speed effects are idealised by a space-state model. …”
    Get full text
    Article
  2. 38922

    Lipid Droplet Surface Promotes 3D Morphological Evolution of Non‐Rhomboidal Cholesterol Crystals by Hyun‐Ro Lee, Seunghan Kang, Siyoung Q. Choi

    Published 2025-01-01
    “…Here, it is demonstrated how cholesterol crystallizes in a non‐rhomboidal shape on the surface of lipid droplets and develops into 3D sheet‐like agglomerates using an in vitro lipid droplet reconstitution system with stereoscopic fluorescence imaging. The findings reveal that interfacial cholesterol transport on the lipid droplet surface and unique lipid droplet components significantly influence the nucleation‐and‐growth dynamics of cholesterol crystals, leading to crystal growth in various polygonal shapes. …”
    Get full text
    Article
  3. 38923

    A Phenomenology of Closed Society in “The Drowned Girl” by Antanas Vienuolis: Anthropological Profiles by Jūratė Levina

    Published 2023-12-01
    “…Such mechanisms are foregrounded on three planes: (1) social, of the rules of relationships between people, which in the story constitute a hierarchal system of power relations modelled on the structure of the traditional family of the agricultural holding, (2) significative, comprising sense-making discourses (traditional customs and Christianity) whereby the culture, in this story, configures the world without transcending corporeally perceivable horizons of the actually lived present, and (3) anthropological, where sociocultural praxis and self-perception are grounded in the essentially unhuman nature which the culture tries to assimilate and erase without recognising its essential otherness. …”
    Get full text
    Article
  4. 38924

    Citoyenneté et identités religieuses dans la doctrine allemande du droit public ecclésiastique au XIXe siècle. Aux sources intellectuelles du modèle allemand de sécularisation... by Florian Reverchon

    Published 2021-11-01
    “… It is generally accepted that the legal doctrine of ecclesiastical public law as taught in German universities in the 19th century shaped some of the basic notions of current law, particularly the core idea according to which some churches, or »religious societies«, are privileged by law, whereas others are not. This system was conceived in a context where individual religious freedom and the neutrality of the state were not the leading principles, and where the objective was to create a kind of parity between the two main churches (Catholicism and Protestantism) in bi-confessional societies. …”
    Get full text
    Article
  5. 38925

    Strategies of police and analytical support for financial crime prevention in a context of global geopolitical crisis. Guidelines for ensuring financial security in Ukraine by Solomiia Vasyuk, Volodymyr Panchenko, Oksana Panchenko, Nataliia Svyrydiuk, Mykola Kuzminov

    Published 2024-12-01
    “…The results obtained show how cooperation between the public and private sectors is essential to establish a solid international system of prevention and police response to financial crimes and, moreover, to promote a culture of security and responsibility at all levels of reality. …”
    Get full text
    Article
  6. 38926

    Analysis of Characteristics, Causes and Countermeasures of the Heavy MetalPollution in the Middle and Upper Reaches of the Diaojiang River Basin by LI Donglin, PENG Bin, LIANG Mei, LU Shangxu, WEI Hailing

    Published 2020-01-01
    “…The combination of water quality and flow monitoring is an important direction for thefuture development of the hydrological monitoring system. Based on the modified Tomlinsonpollution load index evaluation model, this paper arranges 10 sampling sites including TanghanVillage etc. in the middle and upper reaches of the Diaojiang River Basin in the non-flood seasonof 2018 to monitor and survey the quantity and quality of 8 kinds of heavy metal pollutants suchas copper, zinc, arsenic, mercury, cadmium, lead, manganese and antimony synchronously, andanalyzes the causes of pollution and proposes countermeasures by comparing the variation ofpollution characteristics and pollution load indexes before and after the modification of theevaluation model. …”
    Get full text
    Article
  7. 38927

    A structured model for the spread of Mycobacterium marinum: Foundations for a numerical approximation scheme by Azmy S. Ackleh, Mark L. Delcambre, Karyn L. Sutton, Don G. Ennis

    Published 2014-02-01
    “…The model consists of a system of nonlinear hyperbolic partial differential equations coupled with three nonlinear ordinary differential equations. …”
    Get full text
    Article
  8. 38928

    Impact of COVID-19 on routine childhood immunisations in low- and middle-income countries: A scoping review. by Milena Dalton, Benjamin Sanderson, Leanne J Robinson, Caroline S E Homer, William Pomat, Margie Danchin, Stefanie Vaccher

    Published 2023-01-01
    “…We reviewed papers published between March 2020 and June 2022 using a scoping review framework, and assessed each paper across the World Health Organisation health system strengthening framework. Our search identified 3,471 publications; 58 studies were included. …”
    Get full text
    Article
  9. 38929

    Unbiased Diffusion through a Linear Porous Media with Periodic Entropy Barriers: A Tube Formed by Contacting Ellipses by Yoshua Chávez, Marco-Vinicio Vázquez, Leonardo Dagdug

    Published 2015-01-01
    “…The effective one-dimensional reduction is used with distinct forms of a position-dependent diffusion coefficient, D(x), found in literature, to obtain expressions for (I) narrow escape times from a single open-ended tube, (II) its correspondent effective diffusion coefficient, both as functions of the eccentricity of the tube, ε, where ε = 0 returns the system to a spherical vesicle with two open opposite sides, and (III) finally, Lifson-Jackson formula that is used to compute expressions to assess the mean effective diffusion coefficient for a periodic elliptic channel formed by contacting ellipses, also as a function of the eccentricity. …”
    Get full text
    Article
  10. 38930

    Adaptive Neural Control of Hypersonic Vehicles with Actuator Constraints by Changxin Luo, Humin Lei, Dongyang Zhang, Xiaojun Zou

    Published 2018-01-01
    “…Finally, it is theoretically proved that the closed-loop control system is stable. And the effectiveness of the designed controller is verified by simulation.…”
    Get full text
    Article
  11. 38931

    Perfect secrecy cryptosystem with nonuniform distribution of keys by Chuanjun TIAN

    Published 2018-11-01
    “…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
    Get full text
    Article
  12. 38932

    Chased by a Unicorn by Georgios Orfanidis

    Published 2021-01-01
    “…From a first examination of the cultural environment – textual and iconographical – of the unicorn’s appearance, it would seem that the symbolic substance of this animal motif was imbued with the notions of the high virtues of the Christian ideological system (e.g. virginity, purity, salvation). However, the parabolic narrative of the Futile Life reveals another aspect. …”
    Get full text
    Article
  13. 38933

    Software diversity evaluating method based on gadget feature analysis by Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG

    Published 2023-06-01
    “…Software diversity is commonly utilized in scenarios such as software distribution and operating systems to improves system resilience and security.However, existing software diversity evaluation methods are typically based on conventional code features and are relatively limited in scope, which can make it difficult to accurately reflect the security benefits of software diversity.To address this issue, a software diversity evaluation method was proposed from the perspective of ROP attack by analyzing the impact of software diversity on the difficulty of building a gadget attack chain, the attacker’s potentially available computing power, and the attacker’s cost of searching for gadgets in different variants.Metrics for the quality, practicability, and distribution of gadgets were integrated into this method.Testing was conducted using diversity technologies with different granularity.The evaluation results showed that the proposed method could accurately and comprehensively reflect the security gain brought by software diversity.It was observed that software diversity could relocate/modify/delete a large number of gadgets in the software, increasing the cost of attacking different software variants but also leading to different degrees of software expansion.Finally, an analysis and discussion of the advantages and disadvantages of existing diversity techniques were conducted based on the experimental results.…”
    Get full text
    Article
  14. 38934

    Interpreting Myocardial Enzymatic Biomarkers in the Setting of Acute Myocardial Infraction AMI by Khawla A. Kasar, Maha H. Al-Bahrani, Ahmed A. Mohsin

    Published 2022-12-01
    “… The rates of morbidity and mortality for acute myocardial infarction (AMI) have been rising quickly in the last few years. In the systemic circulatory loop, the heart normally pumps blood to the body's extremities. …”
    Get full text
    Article
  15. 38935

    How to Evaluate Students’ Entrepreneurial Projects? International Experience and Recommendations for Application in Russia by P. S. Sorokin, E. V. Morozova, D. Pavlyuk, T. D. Redko

    Published 2022-11-01
    “…In particular, it is necessary to develop a system of criteria that would not only serve educational purposes, but also simulate the emerging of new market enterprises, which remains problematic so far now, despite the active measures from the government to support student initiatives. …”
    Get full text
    Article
  16. 38936

    Conflict Resolution Strategy Based on Flight Conflict Network Optimal Dominating Set by Minggong Wu, Wenda Yang, Kexin Bi, Xiangxi Wen, Jianping Li

    Published 2022-01-01
    “…Compared with the traditional method, the conflict resolution strategy presented in this paper is able to quickly identify key aircraft nodes in the network and has better sensitivity to high-risk conflict edges, which can provide controllers and the control system with a more accurate and reliable suggestion to resolve the flight conflicts macroscopically.…”
    Get full text
    Article
  17. 38937

    Extrinsic and Intrinsic Regulation of Axon Regeneration by MicroRNAs after Spinal Cord Injury by Ping Li, Zhao-Qian Teng, Chang-Mei Liu

    Published 2016-01-01
    “…Most injured neurons fail to regenerate in the central nervous system after injury. Multiple intrinsic and extrinsic factors contribute to the general failure of axonal regeneration after injury. …”
    Get full text
    Article
  18. 38938

    Predicting Students’ Final Performance Using Artificial Neural Networks by Tarik Ahajjam, Mohammed Moutaib, Haidar Aissa, Mourad Azrour, Yousef Farhaoui, Mohammed Fattah

    Published 2022-12-01
    “…The main goal of this article is to predict Moroccan students’ performance in the region of Guelmim Oued Noun using an intelligent system based on neural networks, one of the best data mining techniques that provided us with the best results.…”
    Get full text
    Article
  19. 38939

    Quantifying demand-side management in sustainable grid networks by industrial load flexibility with variable inertia flywheel induction motors by Syed Munimus Salam, Nur Mohammad, Muhammad Mahbubur Rashid

    Published 2025-03-01
    “…The creation of a prototype is used to assess the efficacy of the proposed VIF. To verify the system's efficacy, experiments are conducted. A 33-bus sustainable grid is taken into consideration to assess the overall reduction in power usage in an industrial context. …”
    Get full text
    Article
  20. 38940

    The Exact Endoscopic Effect on the Peristaltic Flow of a Nanofluid by S. M. Khaled, Abdelhalim Ebaid, Fahd Al Mutairi

    Published 2014-01-01
    “…The mathematical model is governed by a system of linear and nonlinear partial differential equations with prescribed boundary conditions. …”
    Get full text
    Article