Showing 9,661 - 9,680 results of 17,101 for search 'Contai~', query time: 2.64s Refine Results
  1. 9661

    Investigation of the Effects of Some Cardiovascular Drugs on Angiogenesis by Transgenic Zebrafish by Hui Lv, Bo Liu, Yongwen Qin

    Published 2023-01-01
    “…Zebrafish embryos at a one-cell stage or two-cell stage were cultured with embryo medium containing cardiovascular drugs at a final solvent concentration of 0.5% (V/V) dimethyl sulfoxide (DMSO) for 24 hours in 24-well plates. …”
    Get full text
    Article
  2. 9662

    Le Maroc au temps des femmes ? La féminisation des associations locales en question by Yasmine Berriane

    Published 2011-12-01
    “…Through the study of the feminization of local associations in a contained area, this article examines the ensuing socio-political transformations. …”
    Get full text
    Article
  3. 9663

    Income and Credit Debt of Private Households by Markus M. Grabka, Berenike Bartz

    Published 2022-03-01
    “…Despite this overall positive development, there is a risk that the problem of over-indebtedness in Germany could increase again since on the one hand, many self-employed people have suffered high turnover losses due to the containment measures of the coronavirus pandemic, while on the other, the ECB could raise nominal interest rates due to tightened inflation, which would lead to a considerable financial burden for indebted households.…”
    Get full text
    Article
  4. 9664

    Immoral Obscenity: Censorship of Folklore Manuscript Collections in Late Stalinist Estonia by Kaisa Kulasalu

    Published 2013-06-01
    “…The history of folkloristics contains many cases of obscene materials that were excluded from field notes, books and archives. …”
    Get full text
    Article
  5. 9665

    Fuzzy Inference-Based Adaptive Sonar Control for Collision Avoidance in Autonomous Underwater Vehicles by Kot Rafał

    Published 2024-12-01
    “…Based on 100 simulation scenarios containing various trajectories created by the mission planner, with various shapes, dimensions and arrangements of static obstacles, and various arrangements and displacement vectors of dynamic obstacles, the effectiveness of the proposed system was tested in comparison with other classical approaches such as a single echosounder and sonar with a fixed scanning sector width. …”
    Get full text
    Article
  6. 9666

    Flow features and truth scale based single-ended objective assessment of perceived quality of VoIP service by CHENG Wei-qing1, GONG Jian1, DING Wei1

    Published 2008-01-01
    “…It only needs to monitor IP packets containing voice data from the peer user received by a local end user to calculate metrics,with no need to synchronize clocks or parse application protocols. …”
    Get full text
    Article
  7. 9667

    A New Method for Isomorphism Identification of Planetary Gear Train based on Improved Hamming Number by Sun Wei, Li Anming, Kong Jianyi, Zuo Huiyan, Wei Sijia

    Published 2020-04-01
    “…The isomorphism identification is one of the indispensable processes in structure synthesis of planetary gear train.It is of great significance for the creation of novel planetary gear train with excellent transmission characteristics.A new method for identifying isomorphism of planetary gear train based on improved Hamming number is proposed.Firstly,a new method for describing the topological diagram of planetary gear train by improved link adjacency matrix is proposed.This matrix contains all the information of the topological structure of planetary gear train and has the uniqueness of description.Then,the basic feature of planetary gear train is represented by the feature code,which is the necessary condition for isomorphism.Then,the principle of improved Hamming number is defined,and the Hamming code is obtained.By distinguishing whether the structural constants of the feature code and the Hamming code are equal,the isomorphism of the planetary gear train is identified.Finally,the validity and reliability of the method are verified by examples.…”
    Get full text
    Article
  8. 9668

    Bouvard et Pécuchet et le savoir médical by Norioki Sugaya

    Published 2009-01-01
    “…This substantial file, which contains reading notes taken by the novelist for the writing of the medical chapter, allows us to understand to what extent the “comic of ideas”, characteristic of the encyclopedic novel, is the result of an intensive work on knowledge. …”
    Get full text
    Article
  9. 9669

    The Role of RaxST, a Prokaryotic Sulfotransferase, and RaxABC, a Putative Type I Secretion System, in Activation of the Rice XA21-Mediated Immune Response by Pamela C. Ronald

    Published 2014-01-01
    “…These observations suggest a model where RaxST sulfates a molecule that contains a leader peptide, which is cleaved by the peptidase domain of the RaxB protein and secreted outside the bacterial cell by the RaxABC T1SS.…”
    Get full text
    Article
  10. 9670

    Crystal storing histiocytosis forming a mass lesion in temporal lobe by Mine Özşen, Şahsine Tolunay, Hasan Kocaeli, Müfit Parlak

    Published 2023-07-01
    “…Crystal storing histiocytosis is a disorder characterized by local or diffuse infiltration of histiocytes containing crystalline inclusions. This entity has been reported in several organs, however the involvement of the central nervous system (CNS) is extremely rare and to date only 7 cases of crystal storing histiocytosis (CSH) of CNS have been reported in the English literature. …”
    Get full text
    Article
  11. 9671

    A RHETORICAL ANALYSIS OF COMMENTS AND DELIVERY STRATEGY ON TED TALKS by Ildi Kurniawan

    Published 2021-02-01
    “…The data of this research were 50 comments of the videos (2016-2020) which contained comments on speaker or talk style not relating to talk content.  …”
    Get full text
    Article
  12. 9672

    Virus economics: an American tragedy by Robert Guttmann

    Published 2021-02-01
    “…The global pandemic forces every country in the world into a complex set of balancing acts between virus spread containment, public health capacity, macro-economic stabilization measures, and business survival amidst depressed levels of activity. …”
    Get full text
    Article
  13. 9673

    Detection and Characterization of β-Lactam Resistance in Bacillus cereus PTCC 1015 by Javad Behravan, Zeinab Rangsaaz

    Published 2004-01-01
    “…B. cereus was inoculated in nutrient broth containing ampicillin (50 μg.ml−1) for 24 h (35°C, 200 rpm). …”
    Get full text
    Article
  14. 9674

    John of the Cross and Emmanuel Lévinas: The QUEST for God beyond Being by D.B. Perrin

    Published 2022-06-01
    “…Simply put, both of these men refused to start their reflection on life and God from self-contained abstract principles; rather, their point of departure was the ambiguity and complexity of the character of human nature. …”
    Get full text
    Article
  15. 9675

    Oral Health and Hygiene Content in Nursing Fundamentals Textbooks by Rita A. Jablonski

    Published 2012-01-01
    “…Although the quality of the content was highly variable, nearly every textbook contained some erroneous or outdated information. The most common areas for inaccuracy included the use of foam sponges for mouth care in dentate persons instead of soft toothbrushes and improper denture removal.…”
    Get full text
    Article
  16. 9676

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article
  17. 9677

    À propos de quelques outils de collecte de données : réflexions sur les pratiques numériques en archéologie by Christophe Tufféry, Vincent Delvigne, Paul Fernandes, Céline Bressy-Léandri

    Published 2021-05-01
    “…An exhaustive and harmonised inventory of rock libraries containing these materials is also in progress. Several digital devices have been used for producing, pooling, analysing, sharing and rendering these spatial data: computer-aided drawing, geographic information systems, database management systems, data sharing and publication platforms, mobile applications. …”
    Get full text
    Article
  18. 9678

    Privacy-preserving image processing in cloud computing by Kui REN

    Published 2016-01-01
    “…Meanwhile, the privacy concerns over the abuse of sensitive information contained in outsourced data also arise in public. …”
    Get full text
    Article
  19. 9679

    Research on the Method of Ground Stress Balance under Complex Conditions Based on Geometric Tracing by Ge Wang

    Published 2022-01-01
    “…Two commonly used methods as well as the proposed method were tested with a model which contains both soil elements and structural elements and a case study. …”
    Get full text
    Article
  20. 9680

    Application of BIM Technology in Design of River Improvement Project by SHAN Qikuan, WU Yiwen, ZHU Cheng

    Published 2022-01-01
    “…In the design of a river improvement project,the cross-section marking is cumbersome,and the calculation of quantities is inaccurate.Therefore,based on traditional river engineering design methods,this paper proposed a BIM design concept.In addition,through the secondary development of some functions of OpenRoadsDesigner software,the paper optimized the engineering quantity generation and output process and developed a set of river engineering BIM design method containing modeling,design,marking,and quantity calculation,which can simultaneously generate three-dimensional models,generate cross-sectional drawings in batches,and calculate engineering quantities.The practice results show that the BIM design concept can greatly improve production efficiency and design accuracy,simplify repetitive work in traditional river designs,make designers focus on engineering scheme designs,and reduce time spent in repetitive work.…”
    Get full text
    Article