Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
37521
Preparation and Characterization of Cetyl Trimethylammonium Intercalated Sericite
Published 2014-01-01“…Intercalated sericite was prepared by intercalation of cetyl trimethylammonium bromide (CTAB) into activated sericite through ion exchange with the following two steps: the activation of sericite by thermal modification, acid activation and sodium modification; the ion exchange intercalation of CTA+ into activated sericite. Effects of reaction time, reaction temperature, CTAB quantity, kinds of medium, and aqueous pH on the intercalation of activated sericite were examined by X-ray diffraction (XRD) analysis, Fourier transform infrared (FT-IR) spectroscopy, differential scanning calorimetry (DSC), and thermogravimetric analysis (TGA). …”
Get full text
Article -
37522
Tracing the paths of modular evolution by quantifying rearrangement events of protein domains
Published 2025-01-01“…In parallel, the observed rates of emergence of new domains are becoming smaller over time.…”
Get full text
Article -
37523
Electrooxidation treatment of simulated wastewater using mixed-metal oxide anodes for bacterial decontamination
Published 2023-03-01“…In particular, a lab-scale batch electrooxidation reactor was used at different operating parameters including NaCl dose ($n$), current density ($j$), and treatment time ($t$) in order to optimize the process using response surface methodology. …”
Get full text
Article -
37524
Nonlinear Simulation and Vulnerability Analysis of Masonry Structures Impacted by Flash Floods
Published 2021-01-01“…Results showed that due to the consideration of wall damage, the time evolution of the impact force on the entire building was distributed in a multipeak pattern. …”
Get full text
Article -
37525
Liver Transplantation in Situs Inversus and Portal Vein Thrombosis (First Case Report in Russia)
Published 2020-09-01“…The surgery duration comprised 5 h 20 min, intraoperative blood loss — 2000 mL, cold ischemia time — 4 h. The patient was discharged on the 10th day after surgery in satisfactory condition.Conclusion. …”
Get full text
Article -
37526
A Large-Scale Snow Depth Retrieval Method for Alaska Based on Point-Surface Fusion and Random Forest Model
Published 2025-01-01“…The method integrates ground-based snow depth measurements with passive microwave brightness temperature data using the RF algorithm and incorporates geographic coordinates, elevation, brightness temperature, brightness temperature gradient differences, and time variables for each grid cell in Alaska, which significantly improves the accuracy and spatial resolution of the large-scale snow depth retrieval. …”
Get full text
Article -
37527
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01“…Expressly, FlowMFD mines the interaction pattern between Tor applications and servers by analysing the time series features (TSFs) of different size packets. …”
Get full text
Article -
37528
Common insect pests in homes and cultural heritage sites
Published 2025-01-01“…Booklice have the ability to eat cellulose fibres found in archived articles and artefacts stored in heritage buildings, causing deterioration and damage to documents over time. This article reviews the literature and presents an overview of the major insect pests belonging to five known orders Coleoptera, Blattodea, Lepidoptera, Zygentoma (long-tailed silverfish) and Psocoptera, which pose a threat to households, museums, depositories, libraries, and cultural heritage buildings. …”
Get full text
Article -
37529
Association of ANKRD55 Gene Polymorphism with HT: A Protective Factor for Disease Susceptibility
Published 2022-01-01“…This study for the first time found that rs7731626 and rs159572 of ANKRD55 were significantly correlated with HT, and individuals carrying the A allele at these two loci had a lower probability of developing HT.…”
Get full text
Article -
37530
V.N. TATISHCHEV’S BUSINESS LETTERS IN THE GENRE ASPECT (BASED ON THE DOCUMENTS OF THE NATIONAL ARCHIVE OF THE REPUBLIC OF KALMYKIA)
Published 2024-12-01“…The study was conducted using the model of document genre that combines multi-level coordinated parameters, such as: “function”, “addresser”, “addressee”, “nature of the information transmitted”, “structure”, “modality”, “space”, “time”. The linguistic means of their realization are revealed. …”
Get full text
Article -
37531
Comparison of earthquake emergency management system in China and Japan
Published 2025-01-01“…This study revealed the unique advantages of China’s emergency management system in dealing with earthquakes from the perspectives of geographical conditions and national culture, and explained the reason why Japan’s emergency management system cannot form a unified leadership. At the same time, drawing lessons from the experience accumulated by Japan in the development of earthquake emergency management, the shortcomings of the current China’s earthquake emergency management system were pointed out, and suggestions were put forward for the development of China’s earthquake emergency management, providing reference for the improvement of China’s earthquake emergency management system.…”
Get full text
Article -
37532
Seepage and Dynamic Characteristics of Carbonaceous Mudstone Coarse-Grained Soil Embankment with Different Gradations
Published 2021-01-01“…Results show that under the condition of the same rainfall time, the greater the nonuniformity coefficient, the faster the decrease in pore water pressure of the coarse-grained soil embankment at the same monitoring point. …”
Get full text
Article -
37533
Clause order in sentences containing a since- subordinate
Published 2013-12-01“…Still, this shift is not strongly discriminative from a semantic point of view, which explains why a causal SC could most of the time be displaced without altering the overall meaning of the sentence. …”
Get full text
Article -
37534
Virtual Instrument for Emissions Measurement of Internal Combustion Engines
Published 2016-01-01“…VIEM works with sensors connected to a signal conditioning system, and a data acquisition system is used as interface for a computer in order to measure and monitor in real time the emissions of O2, NO, CO, SO2, and CO2 gases. …”
Get full text
Article -
37535
Making Systemic Risk Assessments Work: How the DSA Creates a Virtuous Loop to Address the Societal Harms of Content Moderation
Published 2024-10-01“…Instead, the Article argues, the Commission should foster a procedural framework, a “virtuous loop,” which empowers civil society and allows it to specify and refine the standards governing systemic risks over time. Developing this framework, the Article explains how systemic risk assessment can fix “multistakeholderism,” and “multistakeholderism,” in turn, can help make systemic risk assessments work.…”
Get full text
Article -
37536
Kinematic and Dynamic Characteristics of the Free-Floating Space Manipulator with Free-Swinging Joint Failure
Published 2019-01-01“…This research analyzes the kinematic and dynamic characteristics of the free-floating space manipulator with free-swinging joint failure for the first time. It is the theoretical basis of free-swinging joint failure treatment for a space manipulator.…”
Get full text
Article -
37537
Physician Kitasato Shibasaburō: Achievements and posthumous veneration in Shintō
Published 2024-10-01“…In this article, for the first time in the Russian-language scientific literature, his life and achievements are discussed in detail. …”
Get full text
Article -
37538
Highly Efficient Dual-Band Rectifier Based on Symmetric Impedance Control Network
Published 2025-01-01“…This minimizes the overlap time when the two diodes are turned on and maximizes the voltage applied to them. …”
Get full text
Article -
37539
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
37540
Hybrid Quantum Cycle Generative Adversarial Network for Small Molecule Generation
Published 2024-01-01“…The drug design process currently requires considerable time and resources to develop each new compound that enters the market. …”
Get full text
Article