Search alternatives:
resource » source (Expand Search)
Showing 2,881 - 2,900 results of 3,741 for search '(( resource utilization function ) OR ( sources utilization function ))', query time: 0.20s Refine Results
  1. 2881

    A comprehensive review on natural convection in various shaped enclosures by FEM: Engineering applications by Asif Hasan, Mohammad Mokaddes Ali, Shakhawat Hossain, Neamul Haque Siam, Asaduzzaman Rony, Al-Amin Shohan

    Published 2025-10-01
    “…The review further explores localized heat sources, vortex formation due to embedded obstacles, porous media effects, and the synergistic influence of thermal and magnetic fields. …”
    Get full text
    Article
  2. 2882
  3. 2883

    Soil and climate factors affect the nutrient resorption characteristics of desert shrub roots in Xinjiang, China by Yan Luo, Yan Luo, Yan Luo, Wenya Wei, Yaxuan Wang, Tianai Xue, Kaijuan Du

    Published 2025-06-01
    “…This provides theoretical support for understanding how plants in desert ecosystems efficiently utilize limited nutrient resources under extreme drought conditions.…”
    Get full text
    Article
  4. 2884

    Fintech’s Help to Rural Revitalization of commercial Banks-a Aase Study of Agricultural Bank of China by Huang Xin

    Published 2024-01-01
    “…The rapid development of global fintech has changed the traditional financial mode and accelerated the change of the traditional credit intermediary function of commercial banks. Fintech not only brings challenges to commercial banks but also provides new opportunities for commercial banks to develop new business models and innovative businesses and products. …”
    Get full text
    Article
  5. 2885
  6. 2886

    Nutritional Value, Ethnopharmacology, Chemistry, and Biological Activities of Species of the Genus <i>Cnidoscolus</i>: An Updated Review by Joice Barbosa do Nascimento, José Jonas Ferreira Viturino, Maria Alice Macêdo Ribeiro, José Galberto Martins da Costa

    Published 2025-06-01
    “…Additionally, certain species like <i>C. aconitifolius</i> have shown potential for human consumption, with leaves being eaten raw or cooked, while <i>C. quercifolius</i> demonstrates nutritional value in its seeds, which can be utilized in the development of functional foods. However, further studies are needed to focus on the isolation and characterization of bioactive compounds found in these species, as well as deeper investigations into the molecular and cellular mechanisms underlying their biological activities and assessments of the safety of long-term consumption in both humans and animals. …”
    Get full text
    Article
  7. 2887

    Technical stakeholders' perspective of solar photovoltaic system failure in Sub-Saharan Africa: The case of Ghana by Jacob Junior Owusu, Edmund C. Okoroigwe, Chigbo A. Mgbemene, Gabriel Takyi, Onyemaechi Valentine Ekechukwu

    Published 2025-04-01
    “…Alternative electricity-generation fossil-fuel sources are prohibitive. Solar energy photovoltaic systems have great potential in bridging the energy gap in electricity off-grid locations in sub-Saharan Africa and contribute to the region’s energy portfolio at utility and/or domestic levels. …”
    Get full text
    Article
  8. 2888
  9. 2889
  10. 2890

    A risk-based approach to reduction of warm air infiltration for energy efficiency optimization in a cold storage system-a case study of a fruit packaging plant by Peter Kibagendi Mokaya, James Wakiru, Josephat Tanui

    Published 2025-06-01
    “…Thermal graphic measurements, electricity bills, and on-site observation of the operation patterns provided source data. An Ishikawa diagram and a risk-based Failure Mode and Effect Analysis (FMEA) were used to identify and prioritize root causes, respectively, and a modified decision tree was then utilized to structure the mitigation strategy. …”
    Get full text
    Article
  11. 2891

    RANCANG BANGUN MINI LAB FLUIDA SEBAGAI OBJEK PENGAMBILAN DATA UNTUK KEPERLUAN PENELITIAN DI UNIVERSITAS MERCUBUANA KERANGGAN by Aji Gunawan

    Published 2020-03-01
    “…Kata kunci : Lab fluida, perpipaan, pengujian Abstract The fluid lab is functioned as a place for retrieving data in order to learn the process and leading research of fluid. …”
    Get full text
    Article
  12. 2892

    Advances in Stem Cell Therapy for Huntington’s Disease: A Comprehensive Literature Review by Siddharth Shah, Hadeel M. Mansour, Brandon Lucke-Wold

    Published 2025-01-01
    “…Recent research indicates that NSCs have been the most often utilized stem cell type for treating HD. NSCs have been generated and extracted from a variety of sources, including HD patients’ somatic cells and the brain itself. …”
    Get full text
    Article
  13. 2893

    Smart building energy management with renewables and storage systems using a modified weighted mean of vectors algorithm by Mohamed Ebeed, Sabreen hassan, Salah Kamel, Loai Nasrat, Ali Wagdy Mohamed, Abdel-Raheem Youssef

    Published 2025-02-01
    “…The EM problem tackled involves optimizing the scheduling of multiple energy sources, including diesel generators, PV units, and batteries, within a smart building context. …”
    Get full text
    Article
  14. 2894

    Research dynamics and frontier trends of orogenic gold deposits: a knowledge map based on bibliometrics by KeXin Liu, Nan Jiang, YongQiang Zhang

    Published 2025-07-01
    “…Orogenic gold deposits represent a vital component of global gold reserves, functioning as both significant sources of gold and essential indicators for understanding crustal metallogeny within collisional tectonic environments. …”
    Get full text
    Article
  15. 2895

    A Two-Stream Deep Learning Framework for Robust Coral Reef Health Classification: Insights and Interpretability by Arslan Abdul Ghaffar, Gyu Sang Choi

    Published 2025-01-01
    “…We created a specialized dataset of 20,000 images by combining five public datasets, applying a class fusion process to ensure consistent class definitions across diverse data sources. Our methodology addresses challenges such as underwater variation and class imbalance through tailored data augmentation, multi-scale feature analysis, temporal modeling, and weighted loss functions. …”
    Get full text
    Article
  16. 2896

    The Digital Transformation of Tafsir and Its Implications for Islamic Legal Derivation in the Contemporary Era by Ali Sati, Abdul Halim, Abdul Hayy Nasution, Muhammad Ridwan

    Published 2025-06-01
    “…Moving beyond a purely epistemological analysis, the study critically assesses how digital interfaces affect interpretive authority and methodological integrity and the production of contemporary legal responses to real-world issues, including Islamic digital finance, artificial intelligence ethics, and Sharia-based policymaking in digital environments. Utilizing a qualitative literature review combined with thematic content analysis, this research draws on classical sources and contemporary scholarship to investigate the shifting landscape of Islamic legal derivation in the digital age. …”
    Get full text
    Article
  17. 2897

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  18. 2898

    Struggling with capital: Recovery after severe traumatic brain injury among working‐age individuals in Denmark by Anette L. Hindhede

    Published 2024-02-01
    “…Abstract Objective This study uses capital theory to investigate survivors' investments in their bodies and the resources they accumulate during their rehabilitation trajectory, and how these factors impact their perception of recovery from their impairments. …”
    Get full text
    Article
  19. 2899

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  20. 2900

    Influence of Emergent Vegetation Layout on Flow Pattern in a Rectangular Shallow Basin by Junnan LYU, Yuxuan JIANG, Zhidong YAO, Chen YE, Xufeng YAN

    Published 2024-07-01
    “…They play critical roles in ecology, water resource management, environmental protection, and enhancing landscape aesthetics. …”
    Get full text
    Article