Showing 37,681 - 37,700 results of 63,767 for search '"time"', query time: 0.83s Refine Results
  1. 37681

    The Frequency of Intestinal Parasitic Infections in COVID-19 Patients: A Case-Control Study in Tehran, Capital of Iran by Ali Taghipour, Majid Pirestani, Ramin Hamidi Farahani, Mohammad Barati

    Published 2023-01-01
    “…RNA extraction was performed, and then real time reverse-transcription polymerase chain reaction (rRT-PCR) assay was applied to detect viral RNA. …”
    Get full text
    Article
  2. 37682

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  3. 37683

    The Contemporary System of German Economic Diplomacy by R. O. Raynkhardt

    Published 2015-06-01
    “…The author provides a brief summary of historical and economic background, stages and conditions of its development from the 1950-s to present time. He casts light upon the procedures and mechanisms of interaction between the key national economic-diplomatic agents i.e. ministries, agencies, other authorized bodies, public and private institutes outlining their usage of concrete economic, administrative and legal instruments in the course of respective policy measures. …”
    Get full text
    Article
  4. 37684

    Inversion-Based Face Swapping With Diffusion Model by Daehyun Yoo, Hongchul Lee, Jiho Kim

    Published 2025-01-01
    “…Furthermore, the proposed InFS achieved effective face swapping results without requiring additional guidance and reduces inference time by approximately 6.96 seconds compared to previous diffusion-based approaches.…”
    Get full text
    Article
  5. 37685

    Propofol-Based Sedation Does Not Increase Rate of Complication during Percutaneous Endoscopic Gastrostomy Procedure by Somchai Amornyotin, Wiyada Chalayonnavin, Siriporn Kongphlay

    Published 2011-01-01
    “…There were no significant differences in patients' characteristics, sedation time, indication, complications, anesthetic personnel and mortality rate between the two groups. …”
    Get full text
    Article
  6. 37686

    Perception among Healthcare Professionals of the Use of Social Media in Translating Research Evidence into Clinical Practice in Mangalore by Bhaskaran Unnikrishnan, Priya Rathi, Daivik Shah, Abhay Tyagi, Anish V. Rao, Koyel Paul, Joe Tomy

    Published 2018-01-01
    “…Majority of people believed that social media enables wide range of evidence over the shorter span of time, poses a threat to privacy, and cannot replace face to face interaction. …”
    Get full text
    Article
  7. 37687

    Design of Meteorological Element Detection Platform for Atmospheric Boundary Layer Based on UAV by Yonghong Zhang, Tiantian Dong, Yunping Liu

    Published 2017-01-01
    “…Thirdly, data management of the collected data was conducted, including local storage and real-time display on ground host computer. Finally, combined with the comprehensive analysis of the data of automatic weather station, the validity of the data was verified. …”
    Get full text
    Article
  8. 37688

    EDA, PPG and Skin Temperature as Predictive Signals for Mental Failure by a Statistical Analysis on Stress and Mental Workload by G. Luzzani, I. Buraioli, G. Guglieri, D. Demarchi

    Published 2025-01-01
    “…Moreover, fifteen features were found to provide sufficient information to detect at the same time stress and MWL. <italic>Conclusions:</italic> These results demonstrate the feasibility of this approach and push to continue this research about the relationship between physiological signals and the variation of stress and MWL by enhancing the population and considering more biosignals.…”
    Get full text
    Article
  9. 37689

    Strength Theory Model of Unsaturated Soils with Suction Stress Concept by Pan Chen, Changfu Wei, Jie Liu, Tiantian Ma

    Published 2013-01-01
    “…Once the new model is used to predict the change of shear strength, lots of time could be saved due to avoiding heavy and complicated strength tests of unsaturated soils. …”
    Get full text
    Article
  10. 37690

    The Effect of Intake Temperature on the Idle Combustion Cycle Variation of Two-Stroke Aviation Kerosene Piston Engines by Jian Wang, Zhiqiang Han, Yusheng Liang, Zinong Zuo, Zhongxin Fang, Wei Tian, Jia Fang, Xueshun Wu

    Published 2025-01-01
    “…In the lower range, increasing the intake air temperature has a greater effect on reducing the combustion cycle variation, while in the higher range, the combustion cycle variation has a greater impact on the output work. At the same time, the influence of intake air temperature on the fuel evaporation rate is related to engine speed, and this relationship weakens as the engine speed increases. …”
    Get full text
    Article
  11. 37691

    ‘Fission Chips’: An Activist’s View on Anti-Nuclear Activism in South Africa from the 1980s to the 21st Century by Mike Kantey

    Published 2024-10-01
    “…What we consider far more important to grasp is that ‘State Capture’ is not an entirely new phenomenon since what we call the ‘Putsch of Polokwane’ in 2007. From the time of General Jan Smuts to PW Botha, from Mandela to Zuma, the insidious relationship among international arms dealers, globe-trotting Mafiosi, and beneficiaries of the military-industrial global nexus, has remained a constant refrain: only names and places have been changed. …”
    Get full text
    Article
  12. 37692

    Linking the Historical Sample of the Netherlands with the USA Censuses, 1850–1940 by Diogo Paiva, Francisco Anguita, Kees Mandemakers

    Published 2020-09-01
    “…We also evaluated the result in the light of what we know from emigration patterns to the USA over time and period and we concluded that our efforts have produced a reasonable result. …”
    Get full text
    Article
  13. 37693

    A machine learning based classifier for topological quantum materials by Ashiqur Rasul, Md Shafayat Hossain, Ankan Ghosh Dastider, Himaddri Roy, M. Zahid Hasan, Quazi D. M. Khosru

    Published 2024-12-01
    “…A major bottleneck in this field is the computational resources and time complexity related to finding new materials from ab initio calculations. …”
    Get full text
    Article
  14. 37694

    The Effects of Mother-Plant Irrigation Schedule on the Quality Of Tomato (<i>Lycopersicum esculentum</i>) Seed by H Ibrahim, AS Gudugi, JA Oladiran, AJ Odofiin, MKA Adeboye, GO Oyetunde

    Published 2013-07-01
    “…There was no consistent superiority of one irrigation interval over the other in respect of seed longevity over time. A general increase in seedling height and number of leaves per seedling was recorded as storage period progressed before a decline sets in at different ages. …”
    Get full text
    Article
  15. 37695

    A Practical Approach for Predicting Power in a Small-Scale Off-Grid Photovoltaic System using Machine Learning Algorithms by Aadyasha Patel, O. V. Gnana Swathika, Umashankar Subramaniam, T. Sudhakar Babu, Alok Tripathi, Samriddha Nag, Alagar Karthick, M. Muhibbullah

    Published 2022-01-01
    “…Further, a website is developed wherein the user can key in the date and time. The output of that transaction is predicted temperature, humidity, and forecasted power generation of the specific standalone photovoltaic system. …”
    Get full text
    Article
  16. 37696

    Starożytne źródła antropocentryzmu by Anita Ganowicz-Bączyk

    Published 2009-12-01
    “…One can distinguish at least several stages of the process, which led to this crisis, namely: stage of Magic and Myth, Ancient Times, Middle Ages, and Modern Times. The aim of this article is to show the process of development of an anthropocentric thought in Ancient European culture. …”
    Get full text
    Article
  17. 37697

    Transformed Calculation Models in Practice of Dynamic Analysis of Fixed Offshore Platform Structures by Valerii I. Sutyrin, Elvira R. Kuzhakhmetova

    Published 2024-12-01
    “…Modal analysis using a transformed calculation model (TCM) provides a significant reduction in the order and total computational time of the mechanical system. The possibility of analyzing dynamic reactions by a direct method based on the accelerogram of a real earthquake is provided.…”
    Get full text
    Article
  18. 37698

    RESEARCH ON THE DESIGN METHOD OF THE AEROSPACE STANDARD THIN-WALLED SPECIMEN TO MEASURE THE PRECISION OF MACHINE TOOL by JIANG XiaoHui, ZHANG ZhenYa, LI HaoLin, YAO Yao

    Published 2017-01-01
    “…Based on the results of finite element analysis,it’s the first time to put forward the processing complexity coefficient concept,compares the cutting force and thermal load,the cutting force dominates in the residual stress generated,this paper only consider the effect of cutting force,to evaluate the characteristics of the"X"shape aviation thin-wall specimen in the geometric model and mechanical structure design in-depth. …”
    Get full text
    Article
  19. 37699

    Using SaTScan to identify and map nightlife areas in Philadelphia, PA by Eliza W. Kinsey, Kathryn M. Neckerman, James W. Quinn, Michael D. M. Bader, Stephen J. Mooney, Gina S. Lovasi, Dirk Kinsey, Andrew G. Rundle

    Published 2024-12-01
    “…With data from the National Establishment Time Series (NETS) business database, we developed methods to use SaTScan cluster detection software to identify entertainment districts, and applied the method in a case-study of Philadelphia, Pennsylvania. …”
    Get full text
    Article
  20. 37700

    Simulation and Impact Analysis of Flooding Caused by the Break of a Concrete-face Rockfill Dam by ZHAN Mingqiang, GUO Yurong, YANG Yanlong, CHEN Bo

    Published 2022-01-01
    “…Simulation and impact analysis of flooding caused by the break of water reservoir dams is a research priority in the field of prevention and mitigation of disasters surrounding water conservancy projects.To study the scope of submergence and the influencing degree in the downstream areas caused by the break of a concrete-face rockfill dam,by analyzing the characteristics of the concrete-face rockfill dam break,this paper built a one-dimensional unsteady hydrodynamic model of the area from the concrete-face rockfill dam to the hydroelectric power plant reservoir in the downstream.Then,with an actual concrete-face rockfill dam project as a research case,the flood flow distribution under various failure modes of the selected dam case was simulated.The peak flow rate,highest flood level,and the corresponding emergence time of typical sections along the watercourse under the dam were obtained.The results show that the dam-break duration,the final size of the breach,and the water level in front of the dam before the break are the three major factors influencing the simulation calculations with this hydrodynamic model.Shorter duration of dam break,a larger final size of the breach,and a higher water level in front of the dam before the break will lead to a larger peak flow at the dam site.Also,in various dam-break conditions,a large proportion of the major villages and towns on both sides of the downstream flow are expected to be completely submerged.These findings may offer reliable scientific references for the formulation of emergency response and rescue protocols as well as disaster severity evaluation associated with flooding caused by the break of presently active concrete-face rockfill dams.…”
    Get full text
    Article