Showing 68,481 - 68,500 results of 72,708 for search '"system"', query time: 0.24s Refine Results
  1. 68481

    A new mixing chamber geometry design for supersonic ejector performance optimization using computational fluid dynamics by Amer Muzaber, Nadin Bassmaji, Assem Kaddah

    Published 2025-01-01
    “…Jet refrigeration systems have limited usage due to their low coefficient of performance, which depends on ejector performance. …”
    Get full text
    Article
  2. 68482

    A Review of the Engineering Properties of Metakaolin Based Concrete: Towards Combatting Chloride Attack in Coastal/Marine Structures by Deveshan L. Pillay, Oladimeji B. Olalusi, Paul O. Awoyera, Carlos Rondon, Ana María Echeverría, John Temitope Kolawole

    Published 2020-01-01
    “…Hence, there is an increased need for alternate binder systems with the ability to reduce the effects of chloride attack in concrete. …”
    Get full text
    Article
  3. 68483
  4. 68484
  5. 68485

    The Effect of Race and Shear Stress on CRP-Induced Responses in Endothelial Cells by Chenyi Ling, Marc D. Cook, Heather Grimm, Maitha Aldokhayyil, Dulce Gomez, Michael Brown

    Published 2021-01-01
    “…C-reactive protein (CRP) is an independent biomarker of systemic inflammation and a predictor of future cardiovascular disease (CVD). …”
    Get full text
    Article
  6. 68486

    Quantifying spectral information about source separation in multisource odour plumes. by Sina Tootoonian, Aaron C True, Elle Stark, John P Crimaldi, Andreas T Schaefer

    Published 2025-01-01
    “…Our work suggests that the high-frequency acuity of olfactory systems may support high-resolution spatial localization of odour sources. …”
    Get full text
    Article
  7. 68487

    Das Archetypenkonzept C. G. Jungs im Lichte aktueller Erkenntnisse aus Neurowissenschaften, humangenetik und Kulturpsychologie by Christian Roesler

    Published 2014-02-01
    “…Les principales tentatives de résoudre ce problème dans la Psychologie analytique actuelle sont mises en débat, en particulier les argumentations relevant des théories de l’émergence et des systèmes. On présente pour finir diverses études empiriques issues du champ de la Psychologie analytique, qui soumettent à l’examen l’hypothèse de l’existence des archétypes de l’inconscient collectif. …”
    Get full text
    Article
  8. 68488

    Challenges And Strength: A Scoping Review On Online Assessment Practices In Healthcare Professions by Hareem Fatima, Mahwish Niaz, Aisha Rafi, Hassan Salim, Ayesha Yousaf, Muhammad Faraz Sipra

    Published 2024-03-01
    “… Objective: The objective of this scoping review is to carry out a systemic search of published articles to identify and explore the strengths and challenges encountered by students, teachers, and administrative staff in the realm of online assessment, particularly in the context of the ongoing challenges posed by the Coronavirus pandemic, taking into consideration the needs and requirements in online education. …”
    Get full text
    Article
  9. 68489

    Intrinsic assurance: a systematic approach towards extensible cybersecurity by Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG

    Published 2023-02-01
    “…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
    Get full text
    Article
  10. 68490

    Inflammatory Markers in Rheumatoid Patients and Cardiac Function: Insights from an Iranian University Hospital by Fatemeh Omidi, Parisa Delkash

    Published 2024-09-01
    “…Conclusion: Our findings suggest a potential link between systemic inflammation in RA and cardiac remodeling, particularly affecting LA size. …”
    Get full text
    Article
  11. 68491

    Ulama's Role in Addressing Public Health Needs: The Case for or Against Breast Milk Banks? by Misbachussurur, ‪Luqman Rico Khashogi

    Published 2024-11-01
    “…With the potential for a shift from donation-based systems to a commercial model, it is crucial to understand the moral and legal ramifications that may arise within the Muslim community. …”
    Get full text
    Article
  12. 68492

    ‘It was like being hit with a brick’: a qualitative study on the effect of clinicians’ delivery of a diagnosis of eye disease for patients in primary and secondary care by Lucy Moore, Jasleen Kaur Jolly, Anne Ferrey

    Published 2022-07-01
    “…Clinicians should consider how they communicate a diagnosis to patients, how and when they offer information about diagnosis and prognosis and where possible signpost patients to additional support systems and counselling services as early as possible.…”
    Get full text
    Article
  13. 68493

    Review of non-Helicobacter pylori Helicobacter species: Insights into pathogenesis, epidemiology, and clinical implications by M. Kroiß, B. Teodorescu, T. Song, R. Vasapolli

    Published 2024-09-01
    “…Different NHPH species can cause gastritis, ulcerations, and even systemic effects like bacteremia in human individuals. …”
    Get full text
    Article
  14. 68494
  15. 68495

    Determination of Appropriate Thresholding Method in Segmentation Stage in Detecting Breast Cancer Cells by Adem Polat, Cihat Ediz Akbaba

    Published 2022-03-01
    “…Today, computer-aided image processing systems play an important role in the detection of diseases. …”
    Get full text
    Article
  16. 68496

    THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA by Kasim Tatić, Zijad Džafić, Mahir Haračić, Merima Haračić

    Published 2020-05-01
    “… The effective use of cloud technology eliminates the barriers and potential IT obstacles that companies face by using a traditional way of developing a platform for the information systems, as a backbone of modern business. Practical application of any technology and innovation produces distinct advantages and risks that need to be carefully analyzed, identified, and managed within the company. …”
    Get full text
    Article
  17. 68497

    UAlpha40: A comprehensive dataset of Urdu alphabet for Pakistan sign languageMendeley Data by Sameena Javaid, Shahood Sajid, Yusra Khan Baloch

    Published 2025-04-01
    “…This newly developed dataset can be utilized to train vision-based deep learning models, which in turn can aid in the development of sign language translators and finger-spelling systems for USL.…”
    Get full text
    Article
  18. 68498

    Deja vu: Medieval Motifs in Modern Arab Political Life by V. V. Naumkin, V. A. Kuznetsov

    Published 2019-09-01
    “…Finally, the third element discussed is the particular role of the army and other security forces in the Arab political systems.The authors provide three possible interpretations of all the revealed coincidences. …”
    Get full text
    Article
  19. 68499

    Incidence and outcomes of dysnatremia in crush injury patients admitted to Türkiye’s largest hospital following the Kahramanmaraş earthquake by Merve Yazla, Fatih Mehmet Aksoy

    Published 2025-01-01
    “…Age, gender, the city where patients came from, type of presentation, injured organ systems and extremities, laboratory findings, ward admission, intensive care admission, GCS, MESS, ISS, RTS, TRISS, and hemodialysis sessions were analyzed. …”
    Get full text
    Article
  20. 68500