Suggested Topics within your search.
Suggested Topics within your search.
-
941
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
942
Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design
Published 2024-12-01“…The paper then employs a functionally-grounded evaluation method to assess its effectiveness. …”
Get full text
Article -
943
The effectiveness of Pilates exercise in people with chronic low back pain: a systematic review.
Published 2014-01-01“…<h4>Study selection</h4>Two independent reviewers were involved in the selection of evidence. …”
Get full text
Article -
944
Impact of health literacy in patients with chronic musculoskeletal disease--systematic review.
Published 2012-01-01“…We assessed risk of bias from participant selection, methods of measuring health literacy and functional outcomes, missing data, and potential for confounding.…”
Get full text
Article -
945
The effectiveness and safety of acupuncture for post-stroke depression: An overview of systematic reviews
Published 2025-08-01“…The search covered publications from database inception to September 10, 2024. Literature selection and data extraction were independently performed by two reviewers. …”
Get full text
Article -
946
Engineering Circuit Analysis /
Published 2012Table of Contents: “…Mesh Analysis: A Comparison -- 4.6.Computer-Aided Circuit Analysis -- Summary And Review -- Reading Further -- Exercises -- ch. 5 Handy Circuit Analysis Techniques -- 5.1.Linearity and Superposition -- 5.2.Source Transformations -- 5.3.Thevenin and Norton Equivalent Circuits -- 5.4.Maximum Power Transfer -- 5.5.Delta-Wye Conversion -- 5.6.Selecting an Approach: A Summary of Various Techniques -- Summary And Review -- Reading Further -- Exercises -- ch. 6 The Operational Amplifier -- 6.1.Background -- 6.2.The Ideal Op Amp: A Cordial Introduction -- 6.3.Cascaded Stages -- 6.4.Circuits for Voltage and Current Sources -- 6.5.Practical Considerations -- 6.6.Comparators and the Instrumentation Amplifier -- Summary And Review -- Reading Further -- Exercises -- ch. 7 Capacitors And Inductors -- 7.1.The Capacitor -- 7.2.The Inductor -- 7.3.Inductance and Capacitance Combinations -- 7.4.Consequences of Linearity -- 7.5.Simple Op Amp Circuits with Capacitors -- 7.6.Duality -- 7.7.Modeling Capacitors and Inductors with PSpice -- Summary And Review -- Reading Further -- Exercises -- ch. 8 Basic Rl And Rc Circuits -- 8.1.The Source-Free RL Circuit -- 8.2.Properties of the Exponential Response -- 8.3.The Source-Free RC Circuit -- 8.4.A More General Perspective -- 8.5.The Unit-Step Function -- 8.6.Driven RL Circuits -- 8.7.Natural and Forced Response -- 8.8.Driven AC Circuits -- 8.9.Predicting the Response of Sequentially Switched Circuits -- Summary And Review -- Reading Further -- Exercises -- ch. 9 The Rcl Circuit -- 9.1.The Source-Free Parallel Circuit -- 9.2.The Overdamped Parallel RLC Circuit -- 9.3.Critical Damping -- 9.4.The Underdamped Parallel RLC Circuit -- 9.5.The Source-Free Series RLC Circuit -- 9.6.The Complete Response of the RLC Circuit -- 9.7.The Lossless LC Circuit -- Summary And Review -- Reading Further -- Exercises -- ch. 10 Sinusoidal Steady-State Analysis -- 10.1.Characteristics of Sinusoids -- 10.2.Forced Response to Sinusoidal Functions -- 10.3.The Complex Forcing Function -- 10.4.The Phasor -- 10.5.Impedance and Admittance -- 10.6.Nodal and Mesh Analysis -- 10.7.Superposition, Source Transformations and Thevenin's Theorem -- 10.8.Phasor Diagrams -- Summary And Review -- Reading Further -- Exercises -- ch. 11 Ac Circuit Power Analysis -- 11.1.Instantaneous Power -- 11.2.Average Power -- 11.3.Effective Values of Current and Voltage -- 11.4.Apparent Power and Power Factor -- 11.5.Complex Power -- Summary And Review -- Reading Further -- Exercises -- ch. 12 Polyphase Circuits -- 12.1.Polyphase Systems -- 12.2.Single-Phase Three-Wire Systems -- 12.3.Three-Phase Y-Y Connection -- 12.4.The Delta (A) Connection -- 12.5.Power Measurement in Three-Phase Systems -- Summary And Review -- Reading Further -- Exercises -- ch. 13 Magnetically Coupled Circuits -- 13.1.Mutual Inductance -- 13.2.Energy Considerations -- 13.3.The Linear Transformer -- 13.4.The Ideal Transformer -- Summary And Review -- Reading Further -- Exercises -- ch. 14 Complex Frequency And The Laplace Transform -- 14.1.Complex Frequency -- 14.2.The Damped Sinusoidal Forcing Function -- 14.3.Definition of the Laplace Transform -- 14.4.Laplace Transforms of Simple Time Functions -- 14.5.Inverse Transform Techniques -- 14.6.Basic Theorems for the Laplace Transform -- 14.7.The Initial-Value and Final-Value Theorems -- Summary And Review -- Reading Further -- Exercises -- ch. 15 Circuit Analysis In The s-Domain -- 15.1.Z(s) and Y(s) -- 15.2.Nodal and Mesh Analysis in the s-Domain -- 15.3.Additional Circuit Analysis Techniques -- 15.4.Poles, Zeros, and Transfer Functions -- 15.5.Convolution -- 15.6.The Complex-Frequency Plane -- 15.7.Natural Response and the s Plane -- 15.8.A Technique for Synthesizing the Voltage Ratio H(s) = V out/V in -- Summary And Review -- Reading Further -- Exercises -- ch. 16 Frequency Response -- 16.1.Parallel Resonance -- 16.2.Bandwidth and High-Q Circuits -- 16.3.Series Resonance -- 16.4.Other Resonant Forms -- 16.5.Scaling -- 16.6.Bode Diagrams -- 16.7.Basic Filter Design -- 16.8.Advanced Filter Design -- Summary And Review -- Reading Further -- Exercises -- ch. 17 Two-Port Networks -- 17.1.One-Port Networks -- 17.2.Admittance Parameters -- 17.3.Some Equivalent Networks -- 17.4.Impedance Parameters -- 17.5.Hybrid Parameters -- 17.6.Transmission Parameters -- Summary And Review -- Reading Further -- Exercises -- ch. 18 Fourier Circuit Analysis -- 18.1.Trigonometric Form of the Fourier Series -- 18.2.The Use of Symmetry -- 18.3.Complete Response to Periodic Forcing Functions -- 18.4.Complex Form of the Fourier Series -- 18.5.Definition of the Fourier Transform -- 18.6.Some Properties of the Fourier Transform -- 18.7.Fourier Transform Pairs for Some Simple Time Functions -- 18.8.The Fourier Transform of a General Periodic Time Function -- 18.9.The System Function and Response in the Frequency Domain -- 18.10.The Physical Significance of the System Function -- Summary And Review -- Reading Further -- Exercises.…”
Publisher description
Table of contents only
View in OPAC
Book -
947
Effect of PM2.5 exposure on susceptibility to allergic asthma in elderly rats treated with allergens
Published 2025-02-01Get full text
Article -
948
AI-powered literature search: some observations and concerns
Published 2024-12-01“…This raises questions about the data sources utilized by these AI tools and the overall reliability of their outputs. …”
Get full text
Article -
949
Data-driven predictive models for sustainable smart buildings
Published 2025-09-01“…The integration of renewable energy sources in smart buildings fosters a synergistic relationship between clean energy generation and smart energy management systems. …”
Get full text
Article -
950
Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications
Published 2025-05-01“…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
Get full text
Article -
951
SCIENTIFIC AND PRACTICAL APPROACHES TO THE FORMATION OF READINESS OF FUTURE SPECIALISTS IN THE SOCIONOMIC SPHERE FOR THE SOCIAL SUPPORT FOR PARENTS OF CHILDREN WITH SPECIAL NEEDS
Published 2022-12-01“…It has been emphasized that today in higher education there is an approach that orients future specialists to the transfer of this function to other social institutions. This situation does not contribute to the formation of the appropriate level of motivation and ability to energetically engage in their own professional activities, and the capacity to adequately self-assess professional actions in future specialists in the socionomic sphere. …”
Get full text
Article -
952
Comparative analysis of anthocyanin content in various tomato samples in connection with breeding
Published 2022-12-01“…Vegetable products containing antioxidant substances belong to the functional products and conform to the concept of a healthy diet. …”
Get full text
Article -
953
Re-Infection Outcomes Following One- And Two-Stage Surgical Revision of Infected Knee Prosthesis: A Systematic Review and Meta-Analysis.
Published 2016-01-01“…Our second objective was to compare between the two revision strategies, clinical outcomes as measured by postoperative Knee Society Knee score, Knee Society Function score, Hospital for Special Surgery knee score, WOMAC score, and range of motion.…”
Get full text
Article -
954
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
955
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
956
Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade
Published 2025-06-01“…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
Get full text
Article -
957
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
958
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
959
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
960
MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations.
Published 2024-05-01“…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
Get full text
Article