Showing 37,521 - 37,540 results of 63,767 for search '"time"', query time: 0.22s Refine Results
  1. 37521

    Preparation and Characterization of Cetyl Trimethylammonium Intercalated Sericite by Hao Ding, Yuebo Wang, Yu Liang, Faxiang Qin

    Published 2014-01-01
    “…Intercalated sericite was prepared by intercalation of cetyl trimethylammonium bromide (CTAB) into activated sericite through ion exchange with the following two steps: the activation of sericite by thermal modification, acid activation and sodium modification; the ion exchange intercalation of CTA+ into activated sericite. Effects of reaction time, reaction temperature, CTAB quantity, kinds of medium, and aqueous pH on the intercalation of activated sericite were examined by X-ray diffraction (XRD) analysis, Fourier transform infrared (FT-IR) spectroscopy, differential scanning calorimetry (DSC), and thermogravimetric analysis (TGA). …”
    Get full text
    Article
  2. 37522

    Tracing the paths of modular evolution by quantifying rearrangement events of protein domains by Abdulbaki Coban, Erich Bornberg-Bauer, Carsten Kemena

    Published 2025-01-01
    “…In parallel, the observed rates of emergence of new domains are becoming smaller over time.…”
    Get full text
    Article
  3. 37523

    Electrooxidation treatment of simulated wastewater using mixed-metal oxide anodes for bacterial decontamination by Chandra, Poulomi, Choudhury, Diptiman, Verma, Anoop

    Published 2023-03-01
    “…In particular, a lab-scale batch electrooxidation reactor was used at different operating parameters including NaCl dose ($n$), current density ($j$), and treatment time ($t$) in order to optimize the process using response surface methodology. …”
    Get full text
    Article
  4. 37524

    Nonlinear Simulation and Vulnerability Analysis of Masonry Structures Impacted by Flash Floods by Qi Fang, Shuguang Liu, Guihui Zhong, Hong Zhang, Jiyu Liang, Yiwei Zhen

    Published 2021-01-01
    “…Results showed that due to the consideration of wall damage, the time evolution of the impact force on the entire building was distributed in a multipeak pattern. …”
    Get full text
    Article
  5. 37525

    Liver Transplantation in Situs Inversus and Portal Vein Thrombosis (First Case Report in Russia) by M. S. Novruzbekov, O. D. Olisov, V. A. Guliaev, K. N. Lutsyk, K. M. Magomedov, B. I. Kazymov

    Published 2020-09-01
    “…The surgery duration comprised 5 h 20 min, intraoperative blood loss — 2000 mL, cold ischemia time — 4 h. The patient was discharged on the 10th day after surgery in satisfactory condition.Conclusion. …”
    Get full text
    Article
  6. 37526

    A Large-Scale Snow Depth Retrieval Method for Alaska Based on Point-Surface Fusion and Random Forest Model by Ningjun Wang, Tiantian Liu

    Published 2025-01-01
    “…The method integrates ground-based snow depth measurements with passive microwave brightness temperature data using the RF algorithm and incorporates geographic coordinates, elevation, brightness temperature, brightness temperature gradient differences, and time variables for each grid cell in Alaska, which significantly improves the accuracy and spatial resolution of the large-scale snow depth retrieval. …”
    Get full text
    Article
  7. 37527

    FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling by Liukun He, Liangmin Wang, Keyang Cheng, Yifan Xu

    Published 2023-07-01
    “…Expressly, FlowMFD mines the interaction pattern between Tor applications and servers by analysing the time series features (TSFs) of different size packets. …”
    Get full text
    Article
  8. 37528

    Common insect pests in homes and cultural heritage sites by Bouthaina Hasnaoui, Fabien Fohrer, Philippe Parola, Jean-Michel Berenger

    Published 2025-01-01
    “…Booklice have the ability to eat cellulose fibres found in archived articles and artefacts stored in heritage buildings, causing deterioration and damage to documents over time. This article reviews the literature and presents an overview of the major insect pests belonging to five known orders Coleoptera, Blattodea, Lepidoptera, Zygentoma (long-tailed silverfish) and Psocoptera, which pose a threat to households, museums, depositories, libraries, and cultural heritage buildings. …”
    Get full text
    Article
  9. 37529

    Association of ANKRD55 Gene Polymorphism with HT: A Protective Factor for Disease Susceptibility by Yu-die Fang, Jing Zhao, Xin-juan Zhuang, Jian-bin Xu, Tian-tian Cai, Xiao-rong Yang, Kai-da Mu, Jin-an Zhang

    Published 2022-01-01
    “…This study for the first time found that rs7731626 and rs159572 of ANKRD55 were significantly correlated with HT, and individuals carrying the A allele at these two loci had a lower probability of developing HT.…”
    Get full text
    Article
  10. 37530

    V.N. TATISHCHEV’S BUSINESS LETTERS IN THE GENRE ASPECT (BASED ON THE DOCUMENTS OF THE NATIONAL ARCHIVE OF THE REPUBLIC OF KALMYKIA) by Elena M. Sheptukhina

    Published 2024-12-01
    “…The study was conducted using the model of document genre that combines multi-level coordinated parameters, such as: “function”, “addresser”, “addressee”, “nature of the information transmitted”, “structure”, “modality”, “space”, “time”. The linguistic means of their realization are revealed. …”
    Get full text
    Article
  11. 37531

    Comparison of earthquake emergency management system in China and Japan by Zhongzhi Min, Xiaojun Li, Mianshui Rong

    Published 2025-01-01
    “…This study revealed the unique advantages of China’s emergency management system in dealing with earthquakes from the perspectives of geographical conditions and national culture, and explained the reason why Japan’s emergency management system cannot form a unified leadership. At the same time, drawing lessons from the experience accumulated by Japan in the development of earthquake emergency management, the shortcomings of the current China’s earthquake emergency management system were pointed out, and suggestions were put forward for the development of China’s earthquake emergency management, providing reference for the improvement of China’s earthquake emergency management system.…”
    Get full text
    Article
  12. 37532

    Seepage and Dynamic Characteristics of Carbonaceous Mudstone Coarse-Grained Soil Embankment with Different Gradations by Zhong-ming He, Xiao-qu Liu, Ke Huang, Jian-ping Xiong

    Published 2021-01-01
    “…Results show that under the condition of the same rainfall time, the greater the nonuniformity coefficient, the faster the decrease in pore water pressure of the coarse-grained soil embankment at the same monitoring point. …”
    Get full text
    Article
  13. 37533

    Clause order in sentences containing a since- subordinate by Bénédicte GUILLAUME

    Published 2013-12-01
    “…Still, this shift is not strongly discriminative from a semantic point of view, which explains why a causal SC could most of the time be displaced without altering the overall meaning of the sentence. …”
    Get full text
    Article
  14. 37534

    Virtual Instrument for Emissions Measurement of Internal Combustion Engines by Armando Pérez, Rogelio Ramos, Gisela Montero, Marcos Coronado, Conrado García, Rubén Pérez

    Published 2016-01-01
    “…VIEM works with sensors connected to a signal conditioning system, and a data acquisition system is used as interface for a computer in order to measure and monitor in real time the emissions of O2, NO, CO, SO2, and CO2 gases. …”
    Get full text
    Article
  15. 37535

    Making Systemic Risk Assessments Work: How the DSA Creates a Virtuous Loop to Address the Societal Harms of Content Moderation by Niklas Eder

    Published 2024-10-01
    “…Instead, the Article argues, the Commission should foster a procedural framework, a “virtuous loop,” which empowers civil society and allows it to specify and refine the standards governing systemic risks over time. Developing this framework, the Article explains how systemic risk assessment can fix “multistakeholderism,” and “multistakeholderism,” in turn, can help make systemic risk assessments work.…”
    Get full text
    Article
  16. 37536

    Kinematic and Dynamic Characteristics of the Free-Floating Space Manipulator with Free-Swinging Joint Failure by Qingxuan Jia, Bonan Yuan, Gang Chen, Yingzhuo Fu

    Published 2019-01-01
    “…This research analyzes the kinematic and dynamic characteristics of the free-floating space manipulator with free-swinging joint failure for the first time. It is the theoretical basis of free-swinging joint failure treatment for a space manipulator.…”
    Get full text
    Article
  17. 37537

    Physician Kitasato Shibasaburō: Achievements and posthumous veneration in Shintō by V. A. Gorshkov-Cantacuzene

    Published 2024-10-01
    “…In this article, for the first time in the Russian-language scientific literature, his life and achievements are discussed in detail. …”
    Get full text
    Article
  18. 37538

    Highly Efficient Dual-Band Rectifier Based on Symmetric Impedance Control Network by Eojin Kim, Yeonsoo Kim, Juntaek Oh

    Published 2025-01-01
    “…This minimizes the overlap time when the two diodes are turned on and maximizes the voltage applied to them. …”
    Get full text
    Article
  19. 37539

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG

    Published 2022-04-01
    “…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
    Get full text
    Article
  20. 37540

    Hybrid Quantum Cycle Generative Adversarial Network for Small Molecule Generation by Matvei Anoshin, Asel Sagingalieva, Christopher Mansell, Dmitry Zhiganov, Vishal Shete, Markus Pflitsch, Alexey Melnikov

    Published 2024-01-01
    “…The drug design process currently requires considerable time and resources to develop each new compound that enters the market. …”
    Get full text
    Article